Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-0217 (GCVE-0-2009-0217)
Vulnerability from cvelistv5 – Published: 2009-07-14 23:00 – Updated: 2024-08-07 04:24- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:24:18.400Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2009:1428",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1428.html"
},
{
"name": "ADV-2009-3122",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3122"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.openoffice.org/security/cves/CVE-2009-0217.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526"
},
{
"name": "60799",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60799"
},
{
"name": "GLSA-201408-19",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
},
{
"name": "PK80596",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023545\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"name": "RHSA-2009:1200",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"name": "35776",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35776"
},
{
"name": "36162",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36162"
},
{
"name": "36494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36494"
},
{
"name": "ADV-2009-2543",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"name": "35858",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35858"
},
{
"name": "38695",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38695"
},
{
"name": "269208",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1"
},
{
"name": "DSA-1995",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2010/dsa-1995"
},
{
"name": "HPSBUX02476",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "35853",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35853"
},
{
"name": "RHSA-2009:1637",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1637.html"
},
{
"name": "RHSA-2009:1694",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html"
},
{
"name": "35852",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35852"
},
{
"name": "35854",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35854"
},
{
"name": "34461",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/34461"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/WDON-7TY529"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.mono-project.com/Vulnerabilities"
},
{
"name": "1020710",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1"
},
{
"name": "USN-903-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-903-1"
},
{
"name": "35671",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/35671"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527"
},
{
"name": "ADV-2010-0366",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/0366"
},
{
"name": "55907",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/55907"
},
{
"name": "MDVSA-2009:209",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"
},
{
"name": "SUSE-SA:2010:017",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html"
},
{
"name": "38567",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38567"
},
{
"name": "FEDORA-2009-8329",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"
},
{
"name": "263429",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161"
},
{
"name": "SSRT090250",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "ADV-2009-1900",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1900"
},
{
"name": "1022561",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022561"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
},
{
"name": "37671",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37671"
},
{
"name": "VU#466161",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/466161"
},
{
"name": "1022567",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022567"
},
{
"name": "RHSA-2009:1636",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1636.html"
},
{
"name": "PK80627",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023723\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"name": "RHSA-2009:1649",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1649.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
},
{
"name": "TA09-294A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name": "ADV-2009-1909",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1909"
},
{
"name": "ADV-2010-0635",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2010/0635"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.apache.org/viewvc?revision=794013\u0026view=revision"
},
{
"name": "38568",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38568"
},
{
"name": "36180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36180"
},
{
"name": "FEDORA-2009-8456",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03"
},
{
"name": "USN-826-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/826-1/"
},
{
"name": "37841",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37841"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"name": "35855",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35855"
},
{
"name": "FEDORA-2009-8473",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html"
},
{
"name": "36176",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36176"
},
{
"name": "oval:org.mitre.oval:def:7158",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html"
},
{
"name": "ADV-2009-1908",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1908"
},
{
"name": "FEDORA-2009-8337",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925"
},
{
"name": "41818",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/41818"
},
{
"name": "1022661",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022661"
},
{
"name": "37300",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37300"
},
{
"name": "ADV-2009-1911",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1911"
},
{
"name": "APPLE-SA-2009-09-03-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"name": "SUSE-SA:2009:053",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"name": "oval:org.mitre.oval:def:8717",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717"
},
{
"name": "RHSA-2009:1201",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ"
},
{
"name": "TA10-159B",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA10-159B.html"
},
{
"name": "oval:org.mitre.oval:def:10186",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186"
},
{
"name": "55895",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/55895"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.aleksey.com/xmlsec/"
},
{
"name": "MS10-041",
"tags": [
"vendor-advisory",
"x_refsource_MS",
"x_transferred"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041"
},
{
"name": "38921",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/38921"
},
{
"name": "RHSA-2009:1650",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1650.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-07-14T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-12T19:57:01.000Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "RHSA-2009:1428",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1428.html"
},
{
"name": "ADV-2009-3122",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3122"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.openoffice.org/security/cves/CVE-2009-0217.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526"
},
{
"name": "60799",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60799"
},
{
"name": "GLSA-201408-19",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
},
{
"name": "PK80596",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023545\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"name": "RHSA-2009:1200",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"name": "35776",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35776"
},
{
"name": "36162",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36162"
},
{
"name": "36494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36494"
},
{
"name": "ADV-2009-2543",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"name": "35858",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35858"
},
{
"name": "38695",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38695"
},
{
"name": "269208",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1"
},
{
"name": "DSA-1995",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2010/dsa-1995"
},
{
"name": "HPSBUX02476",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "35853",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35853"
},
{
"name": "RHSA-2009:1637",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1637.html"
},
{
"name": "RHSA-2009:1694",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html"
},
{
"name": "35852",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35852"
},
{
"name": "35854",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35854"
},
{
"name": "34461",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/34461"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kb.cert.org/vuls/id/WDON-7TY529"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.mono-project.com/Vulnerabilities"
},
{
"name": "1020710",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1"
},
{
"name": "USN-903-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-903-1"
},
{
"name": "35671",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/35671"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527"
},
{
"name": "ADV-2010-0366",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/0366"
},
{
"name": "55907",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/55907"
},
{
"name": "MDVSA-2009:209",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"
},
{
"name": "SUSE-SA:2010:017",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html"
},
{
"name": "38567",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38567"
},
{
"name": "FEDORA-2009-8329",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"
},
{
"name": "263429",
"tags": [
"vendor-advisory",
"x_refsource_SUNALERT"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161"
},
{
"name": "SSRT090250",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "ADV-2009-1900",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1900"
},
{
"name": "1022561",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022561"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
},
{
"name": "37671",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37671"
},
{
"name": "VU#466161",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/466161"
},
{
"name": "1022567",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022567"
},
{
"name": "RHSA-2009:1636",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1636.html"
},
{
"name": "PK80627",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023723\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"name": "RHSA-2009:1649",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1649.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
},
{
"name": "TA09-294A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name": "ADV-2009-1909",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1909"
},
{
"name": "ADV-2010-0635",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2010/0635"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.apache.org/viewvc?revision=794013\u0026view=revision"
},
{
"name": "38568",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38568"
},
{
"name": "36180",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36180"
},
{
"name": "FEDORA-2009-8456",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03"
},
{
"name": "USN-826-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/826-1/"
},
{
"name": "37841",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37841"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"name": "35855",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35855"
},
{
"name": "FEDORA-2009-8473",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html"
},
{
"name": "36176",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36176"
},
{
"name": "oval:org.mitre.oval:def:7158",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html"
},
{
"name": "ADV-2009-1908",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1908"
},
{
"name": "FEDORA-2009-8337",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925"
},
{
"name": "41818",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/41818"
},
{
"name": "1022661",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022661"
},
{
"name": "37300",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37300"
},
{
"name": "ADV-2009-1911",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1911"
},
{
"name": "APPLE-SA-2009-09-03-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"name": "SUSE-SA:2009:053",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"name": "oval:org.mitre.oval:def:8717",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717"
},
{
"name": "RHSA-2009:1201",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ"
},
{
"name": "TA10-159B",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA10-159B.html"
},
{
"name": "oval:org.mitre.oval:def:10186",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186"
},
{
"name": "55895",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/55895"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.aleksey.com/xmlsec/"
},
{
"name": "MS10-041",
"tags": [
"vendor-advisory",
"x_refsource_MS"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041"
},
{
"name": "38921",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/38921"
},
{
"name": "RHSA-2009:1650",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1650.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2009-0217",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2009:1428",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1428.html"
},
{
"name": "ADV-2009-3122",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3122"
},
{
"name": "http://www.openoffice.org/security/cves/CVE-2009-0217.html",
"refsource": "CONFIRM",
"url": "http://www.openoffice.org/security/cves/CVE-2009-0217.html"
},
{
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526"
},
{
"name": "60799",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60799"
},
{
"name": "GLSA-201408-19",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
},
{
"name": "PK80596",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023545\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"name": "RHSA-2009:1200",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"name": "35776",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35776"
},
{
"name": "36162",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36162"
},
{
"name": "36494",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36494"
},
{
"name": "ADV-2009-2543",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"name": "35858",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35858"
},
{
"name": "38695",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38695"
},
{
"name": "269208",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1"
},
{
"name": "DSA-1995",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-1995"
},
{
"name": "HPSBUX02476",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "35853",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35853"
},
{
"name": "RHSA-2009:1637",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1637.html"
},
{
"name": "RHSA-2009:1694",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html"
},
{
"name": "35852",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35852"
},
{
"name": "35854",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35854"
},
{
"name": "34461",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34461"
},
{
"name": "http://www.kb.cert.org/vuls/id/WDON-7TY529",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/WDON-7TY529"
},
{
"name": "http://www.mono-project.com/Vulnerabilities",
"refsource": "CONFIRM",
"url": "http://www.mono-project.com/Vulnerabilities"
},
{
"name": "1020710",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1"
},
{
"name": "USN-903-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-903-1"
},
{
"name": "35671",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35671"
},
{
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527"
},
{
"name": "ADV-2010-0366",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0366"
},
{
"name": "55907",
"refsource": "OSVDB",
"url": "http://osvdb.org/55907"
},
{
"name": "MDVSA-2009:209",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"
},
{
"name": "SUSE-SA:2010:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html"
},
{
"name": "38567",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38567"
},
{
"name": "FEDORA-2009-8329",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"
},
{
"name": "263429",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1"
},
{
"name": "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161",
"refsource": "CONFIRM",
"url": "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161"
},
{
"name": "SSRT090250",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "ADV-2009-1900",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1900"
},
{
"name": "1022561",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022561"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
},
{
"name": "37671",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37671"
},
{
"name": "VU#466161",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/466161"
},
{
"name": "1022567",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022567"
},
{
"name": "RHSA-2009:1636",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1636.html"
},
{
"name": "PK80627",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023723\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"name": "RHSA-2009:1649",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1649.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
},
{
"name": "TA09-294A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name": "ADV-2009-1909",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1909"
},
{
"name": "ADV-2010-0635",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0635"
},
{
"name": "http://svn.apache.org/viewvc?revision=794013\u0026view=revision",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?revision=794013\u0026view=revision"
},
{
"name": "38568",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38568"
},
{
"name": "36180",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36180"
},
{
"name": "FEDORA-2009-8456",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html"
},
{
"name": "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03",
"refsource": "CONFIRM",
"url": "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03"
},
{
"name": "USN-826-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/826-1/"
},
{
"name": "37841",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37841"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
"refsource": "CONFIRM",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"name": "35855",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35855"
},
{
"name": "FEDORA-2009-8473",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html"
},
{
"name": "36176",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36176"
},
{
"name": "oval:org.mitre.oval:def:7158",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158"
},
{
"name": "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html",
"refsource": "MISC",
"url": "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html"
},
{
"name": "ADV-2009-1908",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1908"
},
{
"name": "FEDORA-2009-8337",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"
},
{
"name": "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925"
},
{
"name": "41818",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41818"
},
{
"name": "1022661",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022661"
},
{
"name": "37300",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37300"
},
{
"name": "ADV-2009-1911",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1911"
},
{
"name": "APPLE-SA-2009-09-03-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"name": "SUSE-SA:2009:053",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"name": "oval:org.mitre.oval:def:8717",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717"
},
{
"name": "RHSA-2009:1201",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"name": "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"name": "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ"
},
{
"name": "TA10-159B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-159B.html"
},
{
"name": "oval:org.mitre.oval:def:10186",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186"
},
{
"name": "55895",
"refsource": "OSVDB",
"url": "http://osvdb.org/55895"
},
{
"name": "http://www.aleksey.com/xmlsec/",
"refsource": "CONFIRM",
"url": "http://www.aleksey.com/xmlsec/"
},
{
"name": "MS10-041",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041"
},
{
"name": "38921",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38921"
},
{
"name": "RHSA-2009:1650",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1650.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=511915",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2009-0217",
"datePublished": "2009-07-14T23:00:00.000Z",
"dateReserved": "2009-01-20T00:00:00.000Z",
"dateUpdated": "2024-08-07T04:24:18.400Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01F45BA3-6504-47AF-B757-7B6D3526FBF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3E6D6AF-0D69-4605-B871-6DAE01CF08EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5EE7744-4584-4AE4-9F27-11EFAA002E77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DE0C501-4062-49D0-8983-5E92765C7181\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE27E903-6D65-4D29-9583-43FB4CB473B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A754DD5-585B-4E89-9C01-2B47D2F5F6F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D40DEF90-CE7F-46BB-A6FF-50C1797866B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5AAA544-D3F8-4AE2-BB2D-A64CB86EC988\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C7D4ECD-8787-4F9B-B81C-C0DFD8DD20EC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C43D3515-D9F5-4DC8-A030-9F97593495F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1968803-FF03-477C-81FE-87528FC6DF6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62C1CA3B-E575-4531-A336-8BFC9F5DEC26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C130982-8C6E-413E-8296-C9C277FCBE6D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E1790E4-073A-4666-80CB-4D967928A0BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.1.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6239EEAE-5852-4DF7-8627-87139BBB03B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"714C405D-1E8F-45C1-8A09-5103F0080C76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:fp17:*:*:*:*:*\", \"matchCriteriaId\": \"D592217D-3489-40AE-8338-BF5AA5BBA251\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C7F31FD3-8681-4F07-9644-5CC87D512520\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2604E01-E43E-4882-8896-5E646E850286\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"458BAD79-958E-4665-B1F8-0D46E0C57045\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A98E5593-1534-48E2-8CD5-B2D1CACDDAB8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB4AB6BD-4439-4100-A3CE-4600AED10B65\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD71D5EA-9AF5-422C-810A-D136A5F132F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"375DF4AF-3C7C-47C3-BBB8-AF2B3827AC13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C9D6BDA-39E1-4D15-9D86-E212809998FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"91CC2DA7-BAA6-4061-8D0C-81F002DEF06D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F2A78FE-8FA6-4532-9E9E-CF6F860EFAE9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59BEDD70-B6DB-448F-A998-3E8774B0DB8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"63099EF9-0512-44CD-946A-9B25144E50D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F200042C-D45E-4CAD-BF6E-E3DADF4D1D21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9132BB1-5E2E-4CA6-9B63-027CF2A7229D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D839EDB9-A44F-4F7F-94EF-1A77371D705C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4421929D-C4B9-43C5-BE61-E68484D3B198\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB622117-C91F-47D2-9832-B7DB340796E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D65E0CC-FA8C-41FD-B256-47DB0C9757FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D87691D-0719-4447-B258-5FA2BD10F11A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D0B1A00-191D-49B2-8841-FB6C48A5D0C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF771E28-65AC-4A94-8A51-4EA77BC3D0B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5594891-E790-44E7-BC9E-0A413B385E1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C286007A-361F-47BB-A099-E041D5CF6E48\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CD464F13-942D-40EC-8144-6D23A0AEAA81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.0.2.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05BC8C52-DA95-4BF2-AD47-9922741CAAF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B9CDD56-921C-4FAF-87E2-14B91EC1A93D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95255265-6D69-46D3-9FFA-8EDB1734375C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E4191D3-64AB-482C-9DEF-DD04C4C942CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FC6EB31-9707-408B-8BF5-66BD23441A75\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B73E052-AF4F-4543-AA03-F5B1FA976EA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23171B81-C991-467A-95A4-EDDAC59C37BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBD75308-7F21-4DDF-AD66-C155CF4B721B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2586C584-3258-414B-AB28-1EBA0DBD0B83\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"431C250D-8279-4071-871C-1C7C4DE09B5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BCA175EA-EDC6-4228-8E28-E9BBC981E60A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC300B03-7A8F-4E96-B55D-18CC258BBFCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6A4EC9D-98C2-40B0-BA40-4838FE8D1FF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3A3ADFB-93E0-42E5-B31B-59F22EA4E3EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AF5BB33-4E78-4123-8093-EBEE2F2B5598\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3F4B8EA-9299-42C1-AAFB-831701ED2FA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A45B6F32-5DFF-4833-9F0F-89576724CF97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13C8054A-8581-4936-AF94-291AE56EB4DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13CA9A59-DFE4-4566-8719-E6FA4720F06A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"026EBFCD-0BC1-404B-BC14-292F35BE667A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A89DD1BF-4AB0-480D-9856-B1BEA73A4AAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B13D74F8-4321-48B3-A33E-FCCFA93013CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49E119EF-B6A5-4B6C-B199-C64F62CA7CB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2043B836-3950-46A1-89E4-08985DEA0D33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9C8FA3D-9162-4D9B-8250-FAC93ED77A2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EE93B7F-3EB5-4BE4-BFAA-4AA30D15A76D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E06DE5D4-D3A5-4783-ACE0-A80808DB09C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0905C80-A1BA-49CD-90CA-9270ECC3940C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B108457A-50DC-4432-9E30-98ADBEBF2389\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mono_project:mono:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"403E554C-FD1B-42CE-82C2-43CC191905DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mono_project:mono:1.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78278FE6-26EA-4E89-9423-EABA6C4D8877\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mono_project:mono:1.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"15E1695E-FD6E-4602-9BD9-9CFFF20574CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mono_project:mono:1.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"691B3AF1-7F3F-4A7D-9F16-FE6044E33482\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mono_project:mono:1.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2DE3739-A2ED-47D7-9AE9-442A95ACFC3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mono_project:mono:1.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DDAB5331-AD2E-483C-93C3-8095BBBA0572\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mono_project:mono:1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3CC03DC-14A6-4C45-9511-7CE8E7F727BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mono_project:mono:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C71A1398-8AA5-4AB3-89C8-E2E2B36FA5AC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:application_server:10.1.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96C617ED-3D8C-4B64-A56A-30BDE6E9B8D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:application_server:10.1.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D41A0A9E-6B5B-4FA9-996B-E589B96C24D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:application_server:10.1.4.3im:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25672ED0-9830-48B3-899A-405B97E2229A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B8AB045-051A-477E-B2F7-4057826C43F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B5D9ABA-10EE-4EE2-9814-BDFBBE9A6014\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09215858-8A4F-4595-98DD-39027EC6CC1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7390B6A-7944-4509-B499-5B51DB9BF42E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"193516AD-8096-4A6E-9C4B-4B9717DD7021\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B1C64BD-7C8C-4B28-9EA8-5198B6C71AD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:weblogic_server_component:8.1:sp6:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3B986B9-A82B-4087-808E-854EC443AC3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:weblogic_server_component:9.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AF95249-8970-406B-B874-4B9925471C27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:weblogic_server_component:9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD536DD6-AF76-4075-8B28-322FB65793AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:weblogic_server_component:9.2:mp3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BDA1940-A3F4-4CEC-BDD0-B098B2E27CE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:weblogic_server_component:10.0:mp1:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BB8A45D-95E5-4F14-A51A-29B5A6E45F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:weblogic_server_component:10.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E3D253B-73D7-4916-B5E4-9D553741E98C\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.\"}, {\"lang\": \"es\", \"value\": \"El dise\\u00f1o de la recomendaci\\u00f3n de W3C XML Signature Syntax and Processing (XMLDsig), tal y como es implementado en productos que incluyen (1) el componente Oracle Security Developer Tools de Application Server de Oracle en versiones 10.1.2.3, 10.1.3.4 y 10.1.4.3IM; (2) el componente WebLogic Server de Product Suite de BEA en las versiones 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0 y 8.1 SP6; (3) Mono anterior a versi\\u00f3n 2.4.2.2; (4) XML Security Library anterior a versi\\u00f3n 1.2.12; (5) WebSphere Application Server de IBM versiones 6.0 hasta 6.0.2.33, versiones 6.1 hasta 6.1.0.23 y versiones 7.0 hasta 7.0.0.1; (6) JDK y JRE de Sun Update 14 y versiones anteriores; (7) .NET Framework de Microsoft versiones 3.0 hasta 3.0 SP2, versiones 3.5 y 4.0; y otros productos utilizan un par\\u00e1metro que define una longitud de truncamiento HMAC (HMACOutputLength) pero no requiere un m\\u00ednimo para esta longitud, lo que permite a los atacantes suplantar firmas basadas en HMAC y omitir la autenticaci\\u00f3n mediante la especificaci\\u00f3n de una longitud de truncamiento con un peque\\u00f1o n\\u00famero de bits.\"}]",
"id": "CVE-2009-0217",
"lastModified": "2024-11-21T00:59:22.190",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2009-07-14T23:30:00.187",
"references": "[{\"url\": \"http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://osvdb.org/55895\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://osvdb.org/55907\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/34461\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/35776\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35852\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35853\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35854\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35855\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35858\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36162\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36176\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36180\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36494\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/37300\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/37671\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/37841\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/38567\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/38568\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/38695\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/38921\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/41818\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://secunia.com/advisories/60799\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://svn.apache.org/viewvc?revision=794013\u0026view=revision\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023545\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere\", \"source\": \"cret@cert.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023723\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere\", \"source\": \"cret@cert.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925\", \"source\": \"cret@cert.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.aleksey.com/xmlsec/\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.debian.org/security/2010/dsa-1995\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/466161\", \"source\": \"cret@cert.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/WDON-7TY529\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:209\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.mono-project.com/Vulnerabilities\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.openoffice.org/security/cves/CVE-2009-0217.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1694.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.securityfocus.com/bid/35671\", \"source\": \"cret@cert.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securitytracker.com/id?1022561\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.securitytracker.com/id?1022567\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.securitytracker.com/id?1022661\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-903-1\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA09-294A.html\", \"source\": \"cret@cert.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA10-159B.html\", \"source\": \"cret@cert.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1900\", \"source\": \"cret@cert.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1908\", \"source\": \"cret@cert.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1909\", \"source\": \"cret@cert.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1911\", \"source\": \"cret@cert.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/2543\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3122\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0366\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0635\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://www.w3.org/2008/06/xmldsigcore-errata.html#e03\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html\", \"source\": \"cret@cert.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=511915\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://issues.apache.org/bugzilla/show_bug.cgi?id=47526\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://issues.apache.org/bugzilla/show_bug.cgi?id=47527\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1200.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1201.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1428.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1636.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1637.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1649.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1650.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://usn.ubuntu.com/826-1/\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html\", \"source\": \"cret@cert.org\"}, {\"url\": \"http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/55895\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/55907\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/34461\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/35776\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35852\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35853\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35854\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35855\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/35858\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36162\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36176\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36180\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/36494\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/37300\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/37671\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/37841\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/38567\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/38568\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/38695\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/38921\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/41818\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/60799\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://svn.apache.org/viewvc?revision=794013\u0026view=revision\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023545\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023723\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.aleksey.com/xmlsec/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2010/dsa-1995\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/466161\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/WDON-7TY529\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2009:209\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mono-project.com/Vulnerabilities\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.openoffice.org/security/cves/CVE-2009-0217.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2009-1694.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/35671\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securitytracker.com/id?1022561\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1022567\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1022661\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-903-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA09-294A.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.us-cert.gov/cas/techalerts/TA10-159B.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1900\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1908\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1909\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/1911\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/2543\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3122\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0366\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2010/0635\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.w3.org/2008/06/xmldsigcore-errata.html#e03\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=511915\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://issues.apache.org/bugzilla/show_bug.cgi?id=47526\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://issues.apache.org/bugzilla/show_bug.cgi?id=47527\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1200.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1201.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1428.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1636.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1637.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1649.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://rhn.redhat.com/errata/RHSA-2009-1650.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://usn.ubuntu.com/826-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2009-0217\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2009-07-14T23:30:00.187\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.\"},{\"lang\":\"es\",\"value\":\"El dise\u00f1o de la recomendaci\u00f3n de W3C XML Signature Syntax and Processing (XMLDsig), tal y como es implementado en productos que incluyen (1) el componente Oracle Security Developer Tools de Application Server de Oracle en versiones 10.1.2.3, 10.1.3.4 y 10.1.4.3IM; (2) el componente WebLogic Server de Product Suite de BEA en las versiones 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0 y 8.1 SP6; (3) Mono anterior a versi\u00f3n 2.4.2.2; (4) XML Security Library anterior a versi\u00f3n 1.2.12; (5) WebSphere Application Server de IBM versiones 6.0 hasta 6.0.2.33, versiones 6.1 hasta 6.1.0.23 y versiones 7.0 hasta 7.0.0.1; (6) JDK y JRE de Sun Update 14 y versiones anteriores; (7) .NET Framework de Microsoft versiones 3.0 hasta 3.0 SP2, versiones 3.5 y 4.0; y otros productos utilizan un par\u00e1metro que define una longitud de truncamiento HMAC (HMACOutputLength) pero no requiere un m\u00ednimo para esta longitud, lo que permite a los atacantes suplantar firmas basadas en HMAC y omitir la autenticaci\u00f3n mediante la especificaci\u00f3n de una longitud de truncamiento con un peque\u00f1o n\u00famero de bits.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01F45BA3-6504-47AF-B757-7B6D3526FBF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3E6D6AF-0D69-4605-B871-6DAE01CF08EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5EE7744-4584-4AE4-9F27-11EFAA002E77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DE0C501-4062-49D0-8983-5E92765C7181\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE27E903-6D65-4D29-9583-43FB4CB473B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A754DD5-585B-4E89-9C01-2B47D2F5F6F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D40DEF90-CE7F-46BB-A6FF-50C1797866B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5AAA544-D3F8-4AE2-BB2D-A64CB86EC988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C7D4ECD-8787-4F9B-B81C-C0DFD8DD20EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C43D3515-D9F5-4DC8-A030-9F97593495F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1968803-FF03-477C-81FE-87528FC6DF6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62C1CA3B-E575-4531-A336-8BFC9F5DEC26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C130982-8C6E-413E-8296-C9C277FCBE6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E1790E4-073A-4666-80CB-4D967928A0BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.1.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6239EEAE-5852-4DF7-8627-87139BBB03B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"714C405D-1E8F-45C1-8A09-5103F0080C76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:fp17:*:*:*:*:*\",\"matchCriteriaId\":\"D592217D-3489-40AE-8338-BF5AA5BBA251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7F31FD3-8681-4F07-9644-5CC87D512520\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2604E01-E43E-4882-8896-5E646E850286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"458BAD79-958E-4665-B1F8-0D46E0C57045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A98E5593-1534-48E2-8CD5-B2D1CACDDAB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB4AB6BD-4439-4100-A3CE-4600AED10B65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD71D5EA-9AF5-422C-810A-D136A5F132F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"375DF4AF-3C7C-47C3-BBB8-AF2B3827AC13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C9D6BDA-39E1-4D15-9D86-E212809998FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91CC2DA7-BAA6-4061-8D0C-81F002DEF06D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F2A78FE-8FA6-4532-9E9E-CF6F860EFAE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59BEDD70-B6DB-448F-A998-3E8774B0DB8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63099EF9-0512-44CD-946A-9B25144E50D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F200042C-D45E-4CAD-BF6E-E3DADF4D1D21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9132BB1-5E2E-4CA6-9B63-027CF2A7229D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D839EDB9-A44F-4F7F-94EF-1A77371D705C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4421929D-C4B9-43C5-BE61-E68484D3B198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB622117-C91F-47D2-9832-B7DB340796E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D65E0CC-FA8C-41FD-B256-47DB0C9757FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D87691D-0719-4447-B258-5FA2BD10F11A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D0B1A00-191D-49B2-8841-FB6C48A5D0C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF771E28-65AC-4A94-8A51-4EA77BC3D0B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5594891-E790-44E7-BC9E-0A413B385E1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C286007A-361F-47BB-A099-E041D5CF6E48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD464F13-942D-40EC-8144-6D23A0AEAA81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.0.2.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05BC8C52-DA95-4BF2-AD47-9922741CAAF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B9CDD56-921C-4FAF-87E2-14B91EC1A93D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95255265-6D69-46D3-9FFA-8EDB1734375C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4191D3-64AB-482C-9DEF-DD04C4C942CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FC6EB31-9707-408B-8BF5-66BD23441A75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B73E052-AF4F-4543-AA03-F5B1FA976EA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23171B81-C991-467A-95A4-EDDAC59C37BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBD75308-7F21-4DDF-AD66-C155CF4B721B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2586C584-3258-414B-AB28-1EBA0DBD0B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"431C250D-8279-4071-871C-1C7C4DE09B5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCA175EA-EDC6-4228-8E28-E9BBC981E60A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC300B03-7A8F-4E96-B55D-18CC258BBFCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6A4EC9D-98C2-40B0-BA40-4838FE8D1FF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3A3ADFB-93E0-42E5-B31B-59F22EA4E3EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AF5BB33-4E78-4123-8093-EBEE2F2B5598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F4B8EA-9299-42C1-AAFB-831701ED2FA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A45B6F32-5DFF-4833-9F0F-89576724CF97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13C8054A-8581-4936-AF94-291AE56EB4DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13CA9A59-DFE4-4566-8719-E6FA4720F06A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"026EBFCD-0BC1-404B-BC14-292F35BE667A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A89DD1BF-4AB0-480D-9856-B1BEA73A4AAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13D74F8-4321-48B3-A33E-FCCFA93013CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49E119EF-B6A5-4B6C-B199-C64F62CA7CB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2043B836-3950-46A1-89E4-08985DEA0D33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9C8FA3D-9162-4D9B-8250-FAC93ED77A2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EE93B7F-3EB5-4BE4-BFAA-4AA30D15A76D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06DE5D4-D3A5-4783-ACE0-A80808DB09C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0905C80-A1BA-49CD-90CA-9270ECC3940C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B108457A-50DC-4432-9E30-98ADBEBF2389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mono_project:mono:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"403E554C-FD1B-42CE-82C2-43CC191905DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mono_project:mono:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78278FE6-26EA-4E89-9423-EABA6C4D8877\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mono_project:mono:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15E1695E-FD6E-4602-9BD9-9CFFF20574CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mono_project:mono:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"691B3AF1-7F3F-4A7D-9F16-FE6044E33482\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mono_project:mono:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2DE3739-A2ED-47D7-9AE9-442A95ACFC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mono_project:mono:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDAB5331-AD2E-483C-93C3-8095BBBA0572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mono_project:mono:1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3CC03DC-14A6-4C45-9511-7CE8E7F727BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mono_project:mono:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C71A1398-8AA5-4AB3-89C8-E2E2B36FA5AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:application_server:10.1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96C617ED-3D8C-4B64-A56A-30BDE6E9B8D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:application_server:10.1.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D41A0A9E-6B5B-4FA9-996B-E589B96C24D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:application_server:10.1.4.3im:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25672ED0-9830-48B3-899A-405B97E2229A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B8AB045-051A-477E-B2F7-4057826C43F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B5D9ABA-10EE-4EE2-9814-BDFBBE9A6014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09215858-8A4F-4595-98DD-39027EC6CC1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7390B6A-7944-4509-B499-5B51DB9BF42E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"193516AD-8096-4A6E-9C4B-4B9717DD7021\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B1C64BD-7C8C-4B28-9EA8-5198B6C71AD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:weblogic_server_component:8.1:sp6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3B986B9-A82B-4087-808E-854EC443AC3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:weblogic_server_component:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AF95249-8970-406B-B874-4B9925471C27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:weblogic_server_component:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD536DD6-AF76-4075-8B28-322FB65793AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:weblogic_server_component:9.2:mp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BDA1940-A3F4-4CEC-BDD0-B098B2E27CE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:weblogic_server_component:10.0:mp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BB8A45D-95E5-4F14-A51A-29B5A6E45F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:weblogic_server_component:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3D253B-73D7-4916-B5E4-9D553741E98C\"}]}]}],\"references\":[{\"url\":\"http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161\",\"source\":\"cret@cert.org\"},{\"url\":\"http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7\",\"source\":\"cret@cert.org\"},{\"url\":\"http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\",\"source\":\"cret@cert.org\"},{\"url\":\"http://osvdb.org/55895\",\"source\":\"cret@cert.org\"},{\"url\":\"http://osvdb.org/55907\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/34461\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/35776\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35852\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35853\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35854\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35855\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35858\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36162\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36176\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36180\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36494\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37300\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/37671\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/37841\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/38567\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/38568\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/38695\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/38921\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/41818\",\"source\":\"cret@cert.org\"},{\"url\":\"http://secunia.com/advisories/60799\",\"source\":\"cret@cert.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1\",\"source\":\"cret@cert.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1\",\"source\":\"cret@cert.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1\",\"source\":\"cret@cert.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1\",\"source\":\"cret@cert.org\"},{\"url\":\"http://svn.apache.org/viewvc?revision=794013\u0026view=revision\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023545\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023723\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.aleksey.com/xmlsec/\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.debian.org/security/2010/dsa-1995\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/466161\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/WDON-7TY529\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:209\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.mono-project.com/Vulnerabilities\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openoffice.org/security/cves/CVE-2009-0217.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1694.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securityfocus.com/bid/35671\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1022561\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securitytracker.com/id?1022567\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.securitytracker.com/id?1022661\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-903-1\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-294A.html\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA10-159B.html\",\"source\":\"cret@cert.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1900\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1908\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1909\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1911\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2543\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3122\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0366\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0635\",\"source\":\"cret@cert.org\"},{\"url\":\"http://www.w3.org/2008/06/xmldsigcore-errata.html#e03\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=511915\",\"source\":\"cret@cert.org\"},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041\",\"source\":\"cret@cert.org\"},{\"url\":\"https://issues.apache.org/bugzilla/show_bug.cgi?id=47526\",\"source\":\"cret@cert.org\"},{\"url\":\"https://issues.apache.org/bugzilla/show_bug.cgi?id=47527\",\"source\":\"cret@cert.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186\",\"source\":\"cret@cert.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158\",\"source\":\"cret@cert.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717\",\"source\":\"cret@cert.org\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1200.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1201.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1428.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1636.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1637.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1649.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1650.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://usn.ubuntu.com/826-1/\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html\",\"source\":\"cret@cert.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html\",\"source\":\"cret@cert.org\"},{\"url\":\"http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/55895\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/55907\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/34461\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35776\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35852\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35853\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35854\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35855\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35858\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36162\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36180\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/36494\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37671\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37841\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38568\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38695\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/38921\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/41818\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/60799\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://svn.apache.org/viewvc?revision=794013\u0026view=revision\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023545\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023723\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.aleksey.com/xmlsec/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2010/dsa-1995\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/466161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/WDON-7TY529\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:209\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mono-project.com/Vulnerabilities\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openoffice.org/security/cves/CVE-2009-0217.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1694.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/35671\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1022561\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1022567\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1022661\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-903-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-294A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA10-159B.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1900\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1908\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1909\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1911\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2543\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/3122\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0366\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2010/0635\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.w3.org/2008/06/xmldsigcore-errata.html#e03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=511915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.apache.org/bugzilla/show_bug.cgi?id=47526\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://issues.apache.org/bugzilla/show_bug.cgi?id=47527\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1200.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1201.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1428.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1636.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1637.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1649.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1650.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/826-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2009-AVI-452
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités affectent différents produits Oracle. L'exploitation de ces vulnérabilités permet de nombreuses actions malveillantes, dont l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été découvertes dans les différents produits Oracle. Ces vulnérabilités touchent les produits des branches de gestion de base de données, de serveurs applicatifs, de E-business, de PeopleSoft et de BEA.
L'exploitation de ces nombreuses vulnérabilités permet des actions malveillantes diverses, dont l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Weblogic | Oracle WebLogic Portal, versions 8.1 à 8.1 SP6, 9.2 à 9.2 MP3, 10.0 à 10.0MP1, 10.2 à 10.2MP1 et 10.3 à 10.3.1 ; | ||
| Oracle | N/A | AutoVue version 19.3 ; | ||
| Oracle | N/A | Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.4.0 et 10.1.3.5.0 ; | ||
| Oracle | N/A | JDEdward Tools version 8.98 ; | ||
| Oracle | N/A | Oracle Database 9i Release 2, versions 9.2.0.8 et 9.2.0.8DV ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise HCM (TAM) versions 8.9 et 9.0 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server versions 9.0 GA, 9.1 GA et 9.2 à 9.2 MP3 ; | ||
| Oracle | N/A | Oracle Database 11g, version 11.1.0.7 ; | ||
| Oracle | N/A | Oracle Database 10g, version 10.1.0.5 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server versions 10.0 jusqu'à MP1 et version 10.3 ; | ||
| Oracle | N/A | Oracle Business Intelligence Enterprise Edition, versions 10.1.3.4.0 et 10.1.3.4.1 ; | ||
| Oracle | N/A | Oracle Database 10g Release 2, versions 10.2.0.3 et 10.2.0.4 ; | ||
| Oracle | N/A | Oracle Communications Order et Service Management, versions 2.8.0, 6.2.0, 6.3.0 et 6.3.1. | ||
| Oracle | N/A | Oracle Application Server 10g Release 2 (10.1.2), version 10.1.2.3.0 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server versions 8.1 à 8.1 SP5 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 11i version 11.5.10.2 ; | ||
| Oracle | PeopleSoft | PeopleSoft PeopleTools & Enterprise Portal version 8.49 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 12 versions 12.0.6 et 12.1 ; | ||
| Oracle | N/A | Oracle JRockit R27.6.4 et versions antérieures (JDK/JRE 6, 5, 1.4.2) ; | ||
| Oracle | N/A | Agile Engineering Data Management (EDM) version 6.1 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server versions 7.0 à 7.0 SP6 ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle WebLogic Portal, versions 8.1 \u00e0 8.1 SP6, 9.2 \u00e0 9.2 MP3, 10.0 \u00e0 10.0MP1, 10.2 \u00e0 10.2MP1 et 10.3 \u00e0 10.3.1 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "AutoVue version 19.3 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.4.0 et 10.1.3.5.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "JDEdward Tools version 8.98 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 9i Release 2, versions 9.2.0.8 et 9.2.0.8DV ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise HCM (TAM) versions 8.9 et 9.0 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server versions 9.0 GA, 9.1 GA et 9.2 \u00e0 9.2 MP3 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g, version 11.1.0.7 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g, version 10.1.0.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server versions 10.0 jusqu\u0027\u00e0 MP1 et version 10.3 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Business Intelligence Enterprise Edition, versions 10.1.3.4.0 et 10.1.3.4.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g Release 2, versions 10.2.0.3 et 10.2.0.4 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Communications Order et Service Management, versions 2.8.0, 6.2.0, 6.3.0 et 6.3.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server 10g Release 2 (10.1.2), version 10.1.2.3.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server versions 8.1 \u00e0 8.1 SP5 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 11i version 11.5.10.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft PeopleTools \u0026 Enterprise Portal version 8.49 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 12 versions 12.0.6 et 12.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit R27.6.4 et versions ant\u00e9rieures (JDK/JRE 6, 5, 1.4.2) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Agile Engineering Data Management (EDM) version 6.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server versions 7.0 \u00e0 7.0 SP6 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les diff\u00e9rents\nproduits Oracle. Ces vuln\u00e9rabilit\u00e9s touchent les produits des branches\nde gestion de base de donn\u00e9es, de serveurs applicatifs, de E-business,\nde PeopleSoft et de BEA.\n\nL\u0027exploitation de ces nombreuses vuln\u00e9rabilit\u00e9s permet des actions\nmalveillantes diverses, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3399",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3399"
},
{
"name": "CVE-2009-3400",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3400"
},
{
"name": "CVE-2009-2002",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2002"
},
{
"name": "CVE-2009-3406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3406"
},
{
"name": "CVE-2009-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1972"
},
{
"name": "CVE-2009-1993",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1993"
},
{
"name": "CVE-2009-3403",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3403"
},
{
"name": "CVE-2009-3404",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3404"
},
{
"name": "CVE-2009-3392",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3392"
},
{
"name": "CVE-2009-1979",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1979"
},
{
"name": "CVE-2009-1995",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1995"
},
{
"name": "CVE-2009-3402",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3402"
},
{
"name": "CVE-2009-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1998"
},
{
"name": "CVE-2009-1964",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1964"
},
{
"name": "CVE-2009-1990",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1990"
},
{
"name": "CVE-2009-1992",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1992"
},
{
"name": "CVE-2009-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3396"
},
{
"name": "CVE-2009-3395",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3395"
},
{
"name": "CVE-2009-3408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3408"
},
{
"name": "CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"name": "CVE-2009-2000",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2000"
},
{
"name": "CVE-2009-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3397"
},
{
"name": "CVE-2009-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1965"
},
{
"name": "CVE-2009-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2001"
},
{
"name": "CVE-2009-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1018"
},
{
"name": "CVE-2009-1991",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1991"
},
{
"name": "CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"name": "CVE-2009-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1971"
},
{
"name": "CVE-2009-1985",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1985"
},
{
"name": "CVE-2009-1997",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1997"
},
{
"name": "CVE-2009-3405",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3405"
},
{
"name": "CVE-2009-1007",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1007"
},
{
"name": "CVE-2009-3409",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3409"
},
{
"name": "CVE-2009-3401",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3401"
},
{
"name": "CVE-2009-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1999"
},
{
"name": "CVE-2009-1994",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1994"
},
{
"name": "CVE-2009-3407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3407"
},
{
"name": "CVE-2009-3393",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3393"
}
],
"links": [],
"reference": "CERTA-2009-AVI-452",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-10-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s affectent diff\u00e9rents produits Oracle.\nL\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet de nombreuses actions\nmalveillantes, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s des produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du mois d\u0027octobre 2009",
"url": "http://www.oracle.com/technologiy/deploy/security/critical-patch-updates/cpuoct2009.html"
}
]
}
CERTA-2009-AVI-279
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Oracle. L'exploitation de ces vulnérabilités permet de réaliser diverses actions malveillantes, dont l'exécution de code arbitraire à distance.
Description
Un grand nombre de vulnérabilités a été découvert dans les produits Oracle. L'exploitation de ces vulnérabilités permet de réaliser diverses actions malveillantes, dont l'exécution de code arbitraire à distance pour certaines.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Weblogic | Oracle WebLogic Server 8.1 à 8.1 SP6 ; | ||
| Oracle | N/A | Oracle Enterprise Manager Grid Control 10g Release 4, version 10.2.0.4 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 12, version 12.0.6 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 10.3, 10.0MP1 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 11i, version 11.5.10.2 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 9.0 GA, 9.1 GA, 9.2 à 9.2 MP3 ; | ||
| Oracle | N/A | Siebel Highly Interactive Client versions 7.5.3, 7.7.2, 7.8, 8.0, 8.1 ; | ||
| Oracle | N/A | Oracle Database 11g, versions 11.1.0.6, 11.1.0.7 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 12, version 12.1 ; | ||
| Oracle | N/A | Oracle Database 10g, version 10.1.0.5 ; | ||
| Oracle | N/A | Oracle JRockit R27.6.3 et les versions précédentes (JDK/JRE 6, 5, 1.4.2). | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise HRMS versions 8.9 et 9.0 ; | ||
| Oracle | N/A | Oracle Identity Management 10g, versions 10.1.4.0.1, 10.1.4.2.0, 10.1.4.3.0 ; | ||
| Oracle | N/A | Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.3.0, 10.1.3.4.0 ; | ||
| Oracle | N/A | Oracle Application Server 10g Release 2 (10.1.2), version 10.1.2.3.0 ; | ||
| Oracle | N/A | Oracle Enterprise Manager Database Control 11, versions 11.1.0.6, 11.1.0.7 ; | ||
| Oracle | N/A | Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.49 ; | ||
| Oracle | N/A | Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV ; | ||
| Oracle | Weblogic | Oracle Complex Event Processing 10.3 et WebLogic Event Server 2.0 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 7.0 à 7.0 SP7 ; |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle WebLogic Server 8.1 \u00e0 8.1 SP6 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Enterprise Manager Grid Control 10g Release 4, version 10.2.0.4 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 12, version 12.0.6 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 10.3, 10.0MP1 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 11i, version 11.5.10.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 9.0 GA, 9.1 GA, 9.2 \u00e0 9.2 MP3 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Siebel Highly Interactive Client versions 7.5.3, 7.7.2, 7.8, 8.0, 8.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g, versions 11.1.0.6, 11.1.0.7 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 12, version 12.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g, version 10.1.0.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit R27.6.3 et les versions pr\u00e9c\u00e9dentes (JDK/JRE 6, 5, 1.4.2).",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise HRMS versions 8.9 et 9.0 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Identity Management 10g, versions 10.1.4.0.1, 10.1.4.2.0, 10.1.4.3.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.3.0, 10.1.3.4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server 10g Release 2 (10.1.2), version 10.1.2.3.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Enterprise Manager Database Control 11, versions 11.1.0.6, 11.1.0.7 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise PeopleTools version 8.49 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Complex Event Processing 10.3 et WebLogic Event Server 2.0 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 7.0 \u00e0 7.0 SP7 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUn grand nombre de vuln\u00e9rabilit\u00e9s a \u00e9t\u00e9 d\u00e9couvert dans les produits\nOracle. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet de r\u00e9aliser diverses\nactions malveillantes, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance\npour certaines.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1019"
},
{
"name": "CVE-2009-1978",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1978"
},
{
"name": "CVE-2009-1969",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1969"
},
{
"name": "CVE-2009-1976",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1976"
},
{
"name": "CVE-2009-1987",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1987"
},
{
"name": "CVE-2009-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1966"
},
{
"name": "CVE-2009-1970",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1970"
},
{
"name": "CVE-2009-1988",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1988"
},
{
"name": "CVE-2009-1968",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1968"
},
{
"name": "CVE-2009-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1974"
},
{
"name": "CVE-2009-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1983"
},
{
"name": "CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"name": "CVE-2009-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1020"
},
{
"name": "CVE-2009-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1015"
},
{
"name": "CVE-2009-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1975"
},
{
"name": "CVE-2009-1973",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1973"
},
{
"name": "CVE-2009-1977",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1977"
},
{
"name": "CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"name": "CVE-2009-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1967"
},
{
"name": "CVE-2009-1982",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1982"
},
{
"name": "CVE-2009-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0987"
},
{
"name": "CVE-2009-1986",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1986"
},
{
"name": "CVE-2009-1963",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1963"
},
{
"name": "CVE-2009-1021",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1021"
},
{
"name": "CVE-2009-1984",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1984"
},
{
"name": "CVE-2009-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1989"
},
{
"name": "CVE-2009-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1981"
},
{
"name": "CVE-2009-1980",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1980"
},
{
"name": "CVE-2009-1523",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1523"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Oracle de Juillet 2009 :",
"url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2009.html"
}
],
"reference": "CERTA-2009-AVI-279",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nOracle. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet de r\u00e9aliser diverses\nactions malveillantes, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans des produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle de juillet 2009",
"url": null
}
]
}
CERTA-2009-AVI-279
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Oracle. L'exploitation de ces vulnérabilités permet de réaliser diverses actions malveillantes, dont l'exécution de code arbitraire à distance.
Description
Un grand nombre de vulnérabilités a été découvert dans les produits Oracle. L'exploitation de ces vulnérabilités permet de réaliser diverses actions malveillantes, dont l'exécution de code arbitraire à distance pour certaines.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Weblogic | Oracle WebLogic Server 8.1 à 8.1 SP6 ; | ||
| Oracle | N/A | Oracle Enterprise Manager Grid Control 10g Release 4, version 10.2.0.4 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 12, version 12.0.6 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 10.3, 10.0MP1 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 11i, version 11.5.10.2 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 9.0 GA, 9.1 GA, 9.2 à 9.2 MP3 ; | ||
| Oracle | N/A | Siebel Highly Interactive Client versions 7.5.3, 7.7.2, 7.8, 8.0, 8.1 ; | ||
| Oracle | N/A | Oracle Database 11g, versions 11.1.0.6, 11.1.0.7 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 12, version 12.1 ; | ||
| Oracle | N/A | Oracle Database 10g, version 10.1.0.5 ; | ||
| Oracle | N/A | Oracle JRockit R27.6.3 et les versions précédentes (JDK/JRE 6, 5, 1.4.2). | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise HRMS versions 8.9 et 9.0 ; | ||
| Oracle | N/A | Oracle Identity Management 10g, versions 10.1.4.0.1, 10.1.4.2.0, 10.1.4.3.0 ; | ||
| Oracle | N/A | Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.3.0, 10.1.3.4.0 ; | ||
| Oracle | N/A | Oracle Application Server 10g Release 2 (10.1.2), version 10.1.2.3.0 ; | ||
| Oracle | N/A | Oracle Enterprise Manager Database Control 11, versions 11.1.0.6, 11.1.0.7 ; | ||
| Oracle | N/A | Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools version 8.49 ; | ||
| Oracle | N/A | Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV ; | ||
| Oracle | Weblogic | Oracle Complex Event Processing 10.3 et WebLogic Event Server 2.0 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 7.0 à 7.0 SP7 ; |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle WebLogic Server 8.1 \u00e0 8.1 SP6 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Enterprise Manager Grid Control 10g Release 4, version 10.2.0.4 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 12, version 12.0.6 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 10.3, 10.0MP1 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 11i, version 11.5.10.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 9.0 GA, 9.1 GA, 9.2 \u00e0 9.2 MP3 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Siebel Highly Interactive Client versions 7.5.3, 7.7.2, 7.8, 8.0, 8.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g, versions 11.1.0.6, 11.1.0.7 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 12, version 12.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g, version 10.1.0.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit R27.6.3 et les versions pr\u00e9c\u00e9dentes (JDK/JRE 6, 5, 1.4.2).",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise HRMS versions 8.9 et 9.0 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Identity Management 10g, versions 10.1.4.0.1, 10.1.4.2.0, 10.1.4.3.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.3.0, 10.1.3.4.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server 10g Release 2 (10.1.2), version 10.1.2.3.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Enterprise Manager Database Control 11, versions 11.1.0.6, 11.1.0.7 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g Release 2, versions 10.2.0.3, 10.2.0.4 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise PeopleTools version 8.49 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 9i Release 2, versions 9.2.0.8, 9.2.0.8DV ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Complex Event Processing 10.3 et WebLogic Event Server 2.0 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 7.0 \u00e0 7.0 SP7 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nUn grand nombre de vuln\u00e9rabilit\u00e9s a \u00e9t\u00e9 d\u00e9couvert dans les produits\nOracle. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet de r\u00e9aliser diverses\nactions malveillantes, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance\npour certaines.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1019"
},
{
"name": "CVE-2009-1978",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1978"
},
{
"name": "CVE-2009-1969",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1969"
},
{
"name": "CVE-2009-1976",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1976"
},
{
"name": "CVE-2009-1987",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1987"
},
{
"name": "CVE-2009-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1966"
},
{
"name": "CVE-2009-1970",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1970"
},
{
"name": "CVE-2009-1988",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1988"
},
{
"name": "CVE-2009-1968",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1968"
},
{
"name": "CVE-2009-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1974"
},
{
"name": "CVE-2009-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1983"
},
{
"name": "CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"name": "CVE-2009-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1020"
},
{
"name": "CVE-2009-1015",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1015"
},
{
"name": "CVE-2009-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1975"
},
{
"name": "CVE-2009-1973",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1973"
},
{
"name": "CVE-2009-1977",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1977"
},
{
"name": "CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"name": "CVE-2009-1967",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1967"
},
{
"name": "CVE-2009-1982",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1982"
},
{
"name": "CVE-2009-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0987"
},
{
"name": "CVE-2009-1986",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1986"
},
{
"name": "CVE-2009-1963",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1963"
},
{
"name": "CVE-2009-1021",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1021"
},
{
"name": "CVE-2009-1984",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1984"
},
{
"name": "CVE-2009-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1989"
},
{
"name": "CVE-2009-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1981"
},
{
"name": "CVE-2009-1980",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1980"
},
{
"name": "CVE-2009-1523",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1523"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Oracle de Juillet 2009 :",
"url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2009.html"
}
],
"reference": "CERTA-2009-AVI-279",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nOracle. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet de r\u00e9aliser diverses\nactions malveillantes, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans des produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle de juillet 2009",
"url": null
}
]
}
CERTA-2010-AVI-253
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité dans Microsoft .NET permet à un utilisateur malveillant de modifier des données sans que cela soit detecté.
Description
Une vulnérabilité dans la signature des documents XML permet à un utilisateur malveillant de modifier un document signé sans que cette manipulation soit detectée.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Microsoft .NET :
- 1.x sans et avec Service Pack;
- 2.x sans et avec Service Pack;
- 3.5 sauf la version sans Service Pack sur Vista SP2 et Windows Server 2008 SP2 ;
- 3.5.1.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eMicrosoft .NET\u0026nbsp;: \u003cUL\u003e \u003cLI\u003e1.x sans et avec Service Pack;\u003c/LI\u003e \u003cLI\u003e2.x sans et avec Service Pack;\u003c/LI\u003e \u003cLI\u003e3.5 sauf la version sans Service Pack sur Vista SP2 et Windows Server 2008 SP2 ;\u003c/LI\u003e \u003cLI\u003e3.5.1.\u003c/LI\u003e \u003c/UL\u003e\u003c/p\u003e",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 dans la signature des documents XML permet \u00e0 un\nutilisateur malveillant de modifier un document sign\u00e9 sans que cette\nmanipulation soit detect\u00e9e.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
}
],
"links": [],
"reference": "CERTA-2010-AVI-253",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-06-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans Microsoft .NET permet \u00e0 un utilisateur\nmalveillant de modifier des donn\u00e9es sans que cela soit detect\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft .NET",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS10-041 du 08 juin 2010",
"url": "http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx"
}
]
}
CERTA-2010-AVI-314
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités présentes dans les produits Oracle permettent à un utilisateur distant de provoquer un déni de service ou d'éxecuter du code arbitraire.
Description
De multiples vulnérabilités sont présentes dans les produits Oracle comme Oracle Database ou Oracle WebLogic. Elles permettent, entre autres, à un utilisateur distant malintentionné de provoquer un déni de service ou d'éxecuter du code arbitaire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | N/A | Oracle Secure Backup version 10301 ; | ||
| Oracle | N/A | Oracle Database 9i Release 2, versions 9208, 9208DV ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools, versions 849 et 850 ; | ||
| Oracle | N/A | Oracle JRockit versions R2800 et antérieures (JDK/JRE 5 et 6) ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise FSCM, versions 89, 90 et 91 ; | ||
| Oracle | N/A | Oracle JRockit versions R2766 et antérieures (JDK/JRE 142, 5 et 6) ; | ||
| Oracle | N/A | Oracle Database 11g Release 2, version 11201 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise HCM, versions 89, 90 et 91 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 100 jusqu'à la version MP2 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 70 jusqu'au Service Pack 7 ; | ||
| Oracle | N/A | Oracle Sun Product Suite. | ||
| Oracle | Weblogic | Oracle WebLogic Server 90, 91, 92 jusqu'à la version MP3 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 11gR1 versions 1031, 1032 et 1033 ; | ||
| Oracle | N/A | Oracle Business Process Management, versions 573, 605, 1031 et 1032 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 12, versions 1204, 1205, 1206, 1211 et 1212 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 81 jusqu'au Service Pack 6 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise Campus Solutions, version 90 ; | ||
| Oracle | N/A | Oracle Transportation Manager, Versions: 550507, 550600 et 6003 ; | ||
| Oracle | N/A | Oracle Enterprise Manager Grid Control 10g Release 5, version 10205 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 11i, versions 11510 et 115102 ; | ||
| Oracle | N/A | Oracle Application Server, 10gR2, version 101230 ; | ||
| Oracle | N/A | Oracle Identity Management 10g, version 101401 ; | ||
| Oracle | N/A | Oracle Enterprise Manager Grid Control 10g Release 1, version 10106 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise CRM, versions 90 et 91 ; | ||
| Oracle | N/A | Oracle TimesTen In-Memory Database, versions 7060, 112141 ; | ||
| Oracle | N/A | Oracle Database 10g Release 2, versions 10203, 10204 ; | ||
| Oracle | N/A | Oracle Database 10g, version 10105 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 10gR3 version 1030 ; | ||
| Oracle | N/A | Oracle Database 11g Release 1, version 11107 ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Secure Backup version 10301 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 9i Release 2, versions 9208, 9208DV ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise PeopleTools, versions 849 et 850 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit versions R2800 et ant\u00e9rieures (JDK/JRE 5 et 6) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise FSCM, versions 89, 90 et 91 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit versions R2766 et ant\u00e9rieures (JDK/JRE 142, 5 et 6) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g Release 2, version 11201 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise HCM, versions 89, 90 et 91 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 100 jusqu\u0027\u00e0 la version MP2 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 70 jusqu\u0027au Service Pack 7 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Sun Product Suite.",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 90, 91, 92 jusqu\u0027\u00e0 la version MP3 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 11gR1 versions 1031, 1032 et 1033 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Business Process Management, versions 573, 605, 1031 et 1032 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 12, versions 1204, 1205, 1206, 1211 et 1212 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 81 jusqu\u0027au Service Pack 6 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise Campus Solutions, version 90 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Transportation Manager, Versions: 550507, 550600 et 6003 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Enterprise Manager Grid Control 10g Release 5, version 10205 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 11i, versions 11510 et 115102 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server, 10gR2, version 101230 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Identity Management 10g, version 101401 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Enterprise Manager Grid Control 10g Release 1, version 10106 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise CRM, versions 90 et 91 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle TimesTen In-Memory Database, versions 7060, 112141 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g Release 2, versions 10203, 10204 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g, version 10105 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 10gR3 version 1030 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g Release 1, version 11107 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans les produits Oracle\ncomme Oracle Database ou Oracle WebLogic. Elles permettent, entre\nautres, \u00e0 un utilisateur distant malintentionn\u00e9 de provoquer un d\u00e9ni de\nservice ou d\u0027\u00e9xecuter du code arbitaire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-0906",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0906"
},
{
"name": "CVE-2010-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0898"
},
{
"name": "CVE-2010-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2380"
},
{
"name": "CVE-2010-2382",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2382"
},
{
"name": "CVE-2010-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0903"
},
{
"name": "CVE-2010-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0899"
},
{
"name": "CVE-2010-2381",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2381"
},
{
"name": "CVE-2010-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2394"
},
{
"name": "CVE-2010-2373",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2373"
},
{
"name": "CVE-2010-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0909"
},
{
"name": "CVE-2010-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0907"
},
{
"name": "CVE-2010-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2392"
},
{
"name": "CVE-2010-2393",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2393"
},
{
"name": "CVE-2010-0914",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0914"
},
{
"name": "CVE-2010-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0901"
},
{
"name": "CVE-2010-0892",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0892"
},
{
"name": "CVE-2010-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2386"
},
{
"name": "CVE-2010-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0915"
},
{
"name": "CVE-2010-0873",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0873"
},
{
"name": "CVE-2010-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0083"
},
{
"name": "CVE-2009-3763",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3763"
},
{
"name": "CVE-2010-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2375"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2008-4247",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4247"
},
{
"name": "CVE-2010-2400",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2400"
},
{
"name": "CVE-2010-0849",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0849"
},
{
"name": "CVE-2010-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2384"
},
{
"name": "CVE-2010-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2374"
},
{
"name": "CVE-2010-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2402"
},
{
"name": "CVE-2010-0912",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0912"
},
{
"name": "CVE-2010-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0913"
},
{
"name": "CVE-2010-2401",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2401"
},
{
"name": "CVE-2009-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3764"
},
{
"name": "CVE-2010-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2376"
},
{
"name": "CVE-2010-0911",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0911"
},
{
"name": "CVE-2010-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2372"
},
{
"name": "CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"name": "CVE-2010-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2398"
},
{
"name": "CVE-2010-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2399"
},
{
"name": "CVE-2010-0081",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0081"
},
{
"name": "CVE-2010-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2377"
},
{
"name": "CVE-2010-0916",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0916"
},
{
"name": "CVE-2010-0835",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0835"
},
{
"name": "CVE-2010-2403",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2403"
},
{
"name": "CVE-2010-2378",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2378"
},
{
"name": "CVE-2010-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0900"
},
{
"name": "CVE-2010-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0908"
},
{
"name": "CVE-2010-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2370"
},
{
"name": "CVE-2010-0910",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0910"
},
{
"name": "CVE-2010-0904",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0904"
},
{
"name": "CVE-2010-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2383"
},
{
"name": "CVE-2010-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0902"
},
{
"name": "CVE-2010-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2385"
},
{
"name": "CVE-2009-3762",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3762"
},
{
"name": "CVE-2010-0905",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0905"
},
{
"name": "CVE-2010-0836",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0836"
},
{
"name": "CVE-2010-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2371"
},
{
"name": "CVE-2010-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2379"
},
{
"name": "CVE-2010-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2397"
}
],
"links": [],
"reference": "CERTA-2010-AVI-314",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits Oracle\npermettent \u00e0 un utilisateur distant de provoquer un d\u00e9ni de service ou\nd\u0027\u00e9xecuter du code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 13 juillet 2010",
"url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html"
}
]
}
CERTA-2010-AVI-080
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités dans OpenOffice.org permettent, entre autres, l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été identifiées dans le navigateur OpenOffice.org. Leurs exploitations permettent notamment à une personne malintentionnée d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
OpenOffice.org versions antérieures à 3.2.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eOpenOffice.org versions ant\u00e9rieures \u00e0 3.2.\u003c/p\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le navigateur\nOpenOffice.org. Leurs exploitations permettent notamment \u00e0 une personne\nmalintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-4339",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4339"
},
{
"name": "CVE-2009-3301",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3301"
},
{
"name": "CVE-2009-2949",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2949"
},
{
"name": "CVE-2009-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2950"
},
{
"name": "CVE-2009-3302",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3302"
},
{
"name": "CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"name": "CVE-2009-2493",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2493"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-1995-1 du 12 f\u00e9vrier 2010 :",
"url": "http://www.debian.org/security/2010/dsa-1995"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2006-4339 :",
"url": "http://www.openoffice.org/security/cves/CVE-2006-4339.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2009-0217 :",
"url": "http://www.openoffice.org/security/cves/CVE-2009-0217.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2009-3301 :",
"url": "http://www.openoffice.org/security/cves/CVE-2009-3301.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2009-3302 :",
"url": "http://www.openoffice.org/security/cves/CVE-2009-3302.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2010-0101-1 du 12 f\u00e9vrier 2010 :",
"url": "http://rhn.redhat.com/errata/RHSA-2010-0101.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2009-2493 :",
"url": "http://www.openoffice.org/security/cves/CVE-2009-2493.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2009-2949 :",
"url": "http://www.openoffice.org/security/cves/CVE-2009-2949.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2009-2950 :",
"url": "http://www.openoffice.org/security/cves/CVE-2009-2950.html"
}
],
"reference": "CERTA-2010-AVI-080",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-02-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans OpenOffice.org permettent, entre\nautres, l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans OpenOffice",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice du 12 f\u00e9vrier 2010",
"url": null
}
]
}
CERTA-2010-AVI-314
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités présentes dans les produits Oracle permettent à un utilisateur distant de provoquer un déni de service ou d'éxecuter du code arbitraire.
Description
De multiples vulnérabilités sont présentes dans les produits Oracle comme Oracle Database ou Oracle WebLogic. Elles permettent, entre autres, à un utilisateur distant malintentionné de provoquer un déni de service ou d'éxecuter du code arbitaire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | N/A | Oracle Secure Backup version 10301 ; | ||
| Oracle | N/A | Oracle Database 9i Release 2, versions 9208, 9208DV ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise PeopleTools, versions 849 et 850 ; | ||
| Oracle | N/A | Oracle JRockit versions R2800 et antérieures (JDK/JRE 5 et 6) ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise FSCM, versions 89, 90 et 91 ; | ||
| Oracle | N/A | Oracle JRockit versions R2766 et antérieures (JDK/JRE 142, 5 et 6) ; | ||
| Oracle | N/A | Oracle Database 11g Release 2, version 11201 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise HCM, versions 89, 90 et 91 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 100 jusqu'à la version MP2 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 70 jusqu'au Service Pack 7 ; | ||
| Oracle | N/A | Oracle Sun Product Suite. | ||
| Oracle | Weblogic | Oracle WebLogic Server 90, 91, 92 jusqu'à la version MP3 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 11gR1 versions 1031, 1032 et 1033 ; | ||
| Oracle | N/A | Oracle Business Process Management, versions 573, 605, 1031 et 1032 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 12, versions 1204, 1205, 1206, 1211 et 1212 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 81 jusqu'au Service Pack 6 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise Campus Solutions, version 90 ; | ||
| Oracle | N/A | Oracle Transportation Manager, Versions: 550507, 550600 et 6003 ; | ||
| Oracle | N/A | Oracle Enterprise Manager Grid Control 10g Release 5, version 10205 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 11i, versions 11510 et 115102 ; | ||
| Oracle | N/A | Oracle Application Server, 10gR2, version 101230 ; | ||
| Oracle | N/A | Oracle Identity Management 10g, version 101401 ; | ||
| Oracle | N/A | Oracle Enterprise Manager Grid Control 10g Release 1, version 10106 ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise CRM, versions 90 et 91 ; | ||
| Oracle | N/A | Oracle TimesTen In-Memory Database, versions 7060, 112141 ; | ||
| Oracle | N/A | Oracle Database 10g Release 2, versions 10203, 10204 ; | ||
| Oracle | N/A | Oracle Database 10g, version 10105 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server 10gR3 version 1030 ; | ||
| Oracle | N/A | Oracle Database 11g Release 1, version 11107 ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Secure Backup version 10301 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 9i Release 2, versions 9208, 9208DV ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise PeopleTools, versions 849 et 850 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit versions R2800 et ant\u00e9rieures (JDK/JRE 5 et 6) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise FSCM, versions 89, 90 et 91 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit versions R2766 et ant\u00e9rieures (JDK/JRE 142, 5 et 6) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g Release 2, version 11201 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise HCM, versions 89, 90 et 91 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 100 jusqu\u0027\u00e0 la version MP2 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 70 jusqu\u0027au Service Pack 7 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Sun Product Suite.",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 90, 91, 92 jusqu\u0027\u00e0 la version MP3 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 11gR1 versions 1031, 1032 et 1033 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Business Process Management, versions 573, 605, 1031 et 1032 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 12, versions 1204, 1205, 1206, 1211 et 1212 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 81 jusqu\u0027au Service Pack 6 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise Campus Solutions, version 90 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Transportation Manager, Versions: 550507, 550600 et 6003 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Enterprise Manager Grid Control 10g Release 5, version 10205 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 11i, versions 11510 et 115102 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server, 10gR2, version 101230 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Identity Management 10g, version 101401 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Enterprise Manager Grid Control 10g Release 1, version 10106 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise CRM, versions 90 et 91 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle TimesTen In-Memory Database, versions 7060, 112141 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g Release 2, versions 10203, 10204 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g, version 10105 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server 10gR3 version 1030 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g Release 1, version 11107 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s sont pr\u00e9sentes dans les produits Oracle\ncomme Oracle Database ou Oracle WebLogic. Elles permettent, entre\nautres, \u00e0 un utilisateur distant malintentionn\u00e9 de provoquer un d\u00e9ni de\nservice ou d\u0027\u00e9xecuter du code arbitaire.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2010-0906",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0906"
},
{
"name": "CVE-2010-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0898"
},
{
"name": "CVE-2010-2380",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2380"
},
{
"name": "CVE-2010-2382",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2382"
},
{
"name": "CVE-2010-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0903"
},
{
"name": "CVE-2010-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0899"
},
{
"name": "CVE-2010-2381",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2381"
},
{
"name": "CVE-2010-2394",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2394"
},
{
"name": "CVE-2010-2373",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2373"
},
{
"name": "CVE-2010-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0909"
},
{
"name": "CVE-2010-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0907"
},
{
"name": "CVE-2010-2392",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2392"
},
{
"name": "CVE-2010-2393",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2393"
},
{
"name": "CVE-2010-0914",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0914"
},
{
"name": "CVE-2010-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0901"
},
{
"name": "CVE-2010-0892",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0892"
},
{
"name": "CVE-2010-2386",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2386"
},
{
"name": "CVE-2010-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0915"
},
{
"name": "CVE-2010-0873",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0873"
},
{
"name": "CVE-2010-0083",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0083"
},
{
"name": "CVE-2009-3763",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3763"
},
{
"name": "CVE-2010-2375",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2375"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2008-4247",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4247"
},
{
"name": "CVE-2010-2400",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2400"
},
{
"name": "CVE-2010-0849",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0849"
},
{
"name": "CVE-2010-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2384"
},
{
"name": "CVE-2010-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2374"
},
{
"name": "CVE-2010-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2402"
},
{
"name": "CVE-2010-0912",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0912"
},
{
"name": "CVE-2010-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0913"
},
{
"name": "CVE-2010-2401",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2401"
},
{
"name": "CVE-2009-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3764"
},
{
"name": "CVE-2010-2376",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2376"
},
{
"name": "CVE-2010-0911",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0911"
},
{
"name": "CVE-2010-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2372"
},
{
"name": "CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"name": "CVE-2010-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2398"
},
{
"name": "CVE-2010-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2399"
},
{
"name": "CVE-2010-0081",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0081"
},
{
"name": "CVE-2010-2377",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2377"
},
{
"name": "CVE-2010-0916",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0916"
},
{
"name": "CVE-2010-0835",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0835"
},
{
"name": "CVE-2010-2403",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2403"
},
{
"name": "CVE-2010-2378",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2378"
},
{
"name": "CVE-2010-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0900"
},
{
"name": "CVE-2010-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0908"
},
{
"name": "CVE-2010-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2370"
},
{
"name": "CVE-2010-0910",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0910"
},
{
"name": "CVE-2010-0904",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0904"
},
{
"name": "CVE-2010-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2383"
},
{
"name": "CVE-2010-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0902"
},
{
"name": "CVE-2010-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2385"
},
{
"name": "CVE-2009-3762",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3762"
},
{
"name": "CVE-2010-0905",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0905"
},
{
"name": "CVE-2010-0836",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0836"
},
{
"name": "CVE-2010-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2371"
},
{
"name": "CVE-2010-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2379"
},
{
"name": "CVE-2010-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2397"
}
],
"links": [],
"reference": "CERTA-2010-AVI-314",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-07-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans les produits Oracle\npermettent \u00e0 un utilisateur distant de provoquer un d\u00e9ni de service ou\nd\u0027\u00e9xecuter du code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du 13 juillet 2010",
"url": "http://www.oracle.com/technology/deploy/security/critical-patch-updates/cpujul2010.html"
}
]
}
CERTA-2010-AVI-253
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité dans Microsoft .NET permet à un utilisateur malveillant de modifier des données sans que cela soit detecté.
Description
Une vulnérabilité dans la signature des documents XML permet à un utilisateur malveillant de modifier un document signé sans que cette manipulation soit detectée.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Microsoft .NET :
- 1.x sans et avec Service Pack;
- 2.x sans et avec Service Pack;
- 3.5 sauf la version sans Service Pack sur Vista SP2 et Windows Server 2008 SP2 ;
- 3.5.1.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eMicrosoft .NET\u0026nbsp;: \u003cUL\u003e \u003cLI\u003e1.x sans et avec Service Pack;\u003c/LI\u003e \u003cLI\u003e2.x sans et avec Service Pack;\u003c/LI\u003e \u003cLI\u003e3.5 sauf la version sans Service Pack sur Vista SP2 et Windows Server 2008 SP2 ;\u003c/LI\u003e \u003cLI\u003e3.5.1.\u003c/LI\u003e \u003c/UL\u003e\u003c/p\u003e",
"content": "## Description\n\nUne vuln\u00e9rabilit\u00e9 dans la signature des documents XML permet \u00e0 un\nutilisateur malveillant de modifier un document sign\u00e9 sans que cette\nmanipulation soit detect\u00e9e.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
}
],
"links": [],
"reference": "CERTA-2010-AVI-253",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-06-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans Microsoft .NET permet \u00e0 un utilisateur\nmalveillant de modifier des donn\u00e9es sans que cela soit detect\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Microsoft .NET",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft MS10-041 du 08 juin 2010",
"url": "http://www.microsoft.com/technet/security/Bulletin/MS10-041.mspx"
}
]
}
CERTA-2010-AVI-080
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités dans OpenOffice.org permettent, entre autres, l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été identifiées dans le navigateur OpenOffice.org. Leurs exploitations permettent notamment à une personne malintentionnée d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
OpenOffice.org versions antérieures à 3.2.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eOpenOffice.org versions ant\u00e9rieures \u00e0 3.2.\u003c/p\u003e",
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le navigateur\nOpenOffice.org. Leurs exploitations permettent notamment \u00e0 une personne\nmalintentionn\u00e9e d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2006-4339",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-4339"
},
{
"name": "CVE-2009-3301",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3301"
},
{
"name": "CVE-2009-2949",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2949"
},
{
"name": "CVE-2009-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2950"
},
{
"name": "CVE-2009-3302",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3302"
},
{
"name": "CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"name": "CVE-2009-2493",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2493"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-1995-1 du 12 f\u00e9vrier 2010 :",
"url": "http://www.debian.org/security/2010/dsa-1995"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2006-4339 :",
"url": "http://www.openoffice.org/security/cves/CVE-2006-4339.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2009-0217 :",
"url": "http://www.openoffice.org/security/cves/CVE-2009-0217.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2009-3301 :",
"url": "http://www.openoffice.org/security/cves/CVE-2009-3301.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2009-3302 :",
"url": "http://www.openoffice.org/security/cves/CVE-2009-3302.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Redhat RHSA-2010-0101-1 du 12 f\u00e9vrier 2010 :",
"url": "http://rhn.redhat.com/errata/RHSA-2010-0101.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2009-2493 :",
"url": "http://www.openoffice.org/security/cves/CVE-2009-2493.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2009-2949 :",
"url": "http://www.openoffice.org/security/cves/CVE-2009-2949.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice CVE-2009-2950 :",
"url": "http://www.openoffice.org/security/cves/CVE-2009-2950.html"
}
],
"reference": "CERTA-2010-AVI-080",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-02-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans OpenOffice.org permettent, entre\nautres, l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans OpenOffice",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 OpenOffice du 12 f\u00e9vrier 2010",
"url": null
}
]
}
CERTA-2009-AVI-452
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités affectent différents produits Oracle. L'exploitation de ces vulnérabilités permet de nombreuses actions malveillantes, dont l'exécution de code arbitraire à distance.
Description
De multiples vulnérabilités ont été découvertes dans les différents produits Oracle. Ces vulnérabilités touchent les produits des branches de gestion de base de données, de serveurs applicatifs, de E-business, de PeopleSoft et de BEA.
L'exploitation de ces nombreuses vulnérabilités permet des actions malveillantes diverses, dont l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | Weblogic | Oracle WebLogic Portal, versions 8.1 à 8.1 SP6, 9.2 à 9.2 MP3, 10.0 à 10.0MP1, 10.2 à 10.2MP1 et 10.3 à 10.3.1 ; | ||
| Oracle | N/A | AutoVue version 19.3 ; | ||
| Oracle | N/A | Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.4.0 et 10.1.3.5.0 ; | ||
| Oracle | N/A | JDEdward Tools version 8.98 ; | ||
| Oracle | N/A | Oracle Database 9i Release 2, versions 9.2.0.8 et 9.2.0.8DV ; | ||
| Oracle | PeopleSoft | PeopleSoft Enterprise HCM (TAM) versions 8.9 et 9.0 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server versions 9.0 GA, 9.1 GA et 9.2 à 9.2 MP3 ; | ||
| Oracle | N/A | Oracle Database 11g, version 11.1.0.7 ; | ||
| Oracle | N/A | Oracle Database 10g, version 10.1.0.5 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server versions 10.0 jusqu'à MP1 et version 10.3 ; | ||
| Oracle | N/A | Oracle Business Intelligence Enterprise Edition, versions 10.1.3.4.0 et 10.1.3.4.1 ; | ||
| Oracle | N/A | Oracle Database 10g Release 2, versions 10.2.0.3 et 10.2.0.4 ; | ||
| Oracle | N/A | Oracle Communications Order et Service Management, versions 2.8.0, 6.2.0, 6.3.0 et 6.3.1. | ||
| Oracle | N/A | Oracle Application Server 10g Release 2 (10.1.2), version 10.1.2.3.0 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server versions 8.1 à 8.1 SP5 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 11i version 11.5.10.2 ; | ||
| Oracle | PeopleSoft | PeopleSoft PeopleTools & Enterprise Portal version 8.49 ; | ||
| Oracle | N/A | Oracle E-Business Suite Release 12 versions 12.0.6 et 12.1 ; | ||
| Oracle | N/A | Oracle JRockit R27.6.4 et versions antérieures (JDK/JRE 6, 5, 1.4.2) ; | ||
| Oracle | N/A | Agile Engineering Data Management (EDM) version 6.1 ; | ||
| Oracle | Weblogic | Oracle WebLogic Server versions 7.0 à 7.0 SP6 ; |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle WebLogic Portal, versions 8.1 \u00e0 8.1 SP6, 9.2 \u00e0 9.2 MP3, 10.0 \u00e0 10.0MP1, 10.2 \u00e0 10.2MP1 et 10.3 \u00e0 10.3.1 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "AutoVue version 19.3 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server 10g Release 3 (10.1.3), versions 10.1.3.4.0 et 10.1.3.5.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "JDEdward Tools version 8.98 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 9i Release 2, versions 9.2.0.8 et 9.2.0.8DV ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft Enterprise HCM (TAM) versions 8.9 et 9.0 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server versions 9.0 GA, 9.1 GA et 9.2 \u00e0 9.2 MP3 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 11g, version 11.1.0.7 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g, version 10.1.0.5 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server versions 10.0 jusqu\u0027\u00e0 MP1 et version 10.3 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Business Intelligence Enterprise Edition, versions 10.1.3.4.0 et 10.1.3.4.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Database 10g Release 2, versions 10.2.0.3 et 10.2.0.4 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Communications Order et Service Management, versions 2.8.0, 6.2.0, 6.3.0 et 6.3.1.",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Application Server 10g Release 2 (10.1.2), version 10.1.2.3.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server versions 8.1 \u00e0 8.1 SP5 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 11i version 11.5.10.2 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "PeopleSoft PeopleTools \u0026 Enterprise Portal version 8.49 ;",
"product": {
"name": "PeopleSoft",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle E-Business Suite Release 12 versions 12.0.6 et 12.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle JRockit R27.6.4 et versions ant\u00e9rieures (JDK/JRE 6, 5, 1.4.2) ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Agile Engineering Data Management (EDM) version 6.1 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle WebLogic Server versions 7.0 \u00e0 7.0 SP6 ;",
"product": {
"name": "Weblogic",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les diff\u00e9rents\nproduits Oracle. Ces vuln\u00e9rabilit\u00e9s touchent les produits des branches\nde gestion de base de donn\u00e9es, de serveurs applicatifs, de E-business,\nde PeopleSoft et de BEA.\n\nL\u0027exploitation de ces nombreuses vuln\u00e9rabilit\u00e9s permet des actions\nmalveillantes diverses, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3399",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3399"
},
{
"name": "CVE-2009-3400",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3400"
},
{
"name": "CVE-2009-2002",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2002"
},
{
"name": "CVE-2009-3406",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3406"
},
{
"name": "CVE-2009-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1972"
},
{
"name": "CVE-2009-1993",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1993"
},
{
"name": "CVE-2009-3403",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3403"
},
{
"name": "CVE-2009-3404",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3404"
},
{
"name": "CVE-2009-3392",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3392"
},
{
"name": "CVE-2009-1979",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1979"
},
{
"name": "CVE-2009-1995",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1995"
},
{
"name": "CVE-2009-3402",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3402"
},
{
"name": "CVE-2009-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1998"
},
{
"name": "CVE-2009-1964",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1964"
},
{
"name": "CVE-2009-1990",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1990"
},
{
"name": "CVE-2009-1992",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1992"
},
{
"name": "CVE-2009-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3396"
},
{
"name": "CVE-2009-3395",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3395"
},
{
"name": "CVE-2009-3408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3408"
},
{
"name": "CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"name": "CVE-2009-2000",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2000"
},
{
"name": "CVE-2009-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3397"
},
{
"name": "CVE-2009-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1965"
},
{
"name": "CVE-2009-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2001"
},
{
"name": "CVE-2009-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1018"
},
{
"name": "CVE-2009-1991",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1991"
},
{
"name": "CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"name": "CVE-2009-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1971"
},
{
"name": "CVE-2009-1985",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1985"
},
{
"name": "CVE-2009-1997",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1997"
},
{
"name": "CVE-2009-3405",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3405"
},
{
"name": "CVE-2009-1007",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1007"
},
{
"name": "CVE-2009-3409",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3409"
},
{
"name": "CVE-2009-3401",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3401"
},
{
"name": "CVE-2009-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1999"
},
{
"name": "CVE-2009-1994",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1994"
},
{
"name": "CVE-2009-3407",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3407"
},
{
"name": "CVE-2009-3393",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3393"
}
],
"links": [],
"reference": "CERTA-2009-AVI-452",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-10-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s affectent diff\u00e9rents produits Oracle.\nL\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet de nombreuses actions\nmalveillantes, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s des produits Oracle",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle du mois d\u0027octobre 2009",
"url": "http://www.oracle.com/technologiy/deploy/security/critical-patch-updates/cpuoct2009.html"
}
]
}
RHSA-2009:1201
Vulnerability from csaf_redhat - Published: 2009-08-06 21:14 - Updated: 2026-03-13 01:03The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.
The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-openjdk packages that fix several security issues and a\nbug are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit. The Java Runtime Environment (JRE)\ncontains the software and tools that users need to run applications written\nusing the Java programming language.\n\nA flaw was found in the way the XML Digital Signature implementation in the\nJRE handled HMAC-based XML signatures. An attacker could use this flaw to\ncreate a crafted signature that could allow them to bypass authentication,\nor trick a user, applet, or application into accepting untrusted content.\n(CVE-2009-0217)\n\nSeveral potential information leaks were found in various mutable static\nvariables. These could be exploited in application scenarios that execute\nuntrusted scripting code. (CVE-2009-2475)\n\nIt was discovered that OpenType checks can be bypassed. This could allow a\nrogue application to bypass access restrictions by acquiring references to\nprivileged objects through finalizer resurrection. (CVE-2009-2476)\n\nA denial of service flaw was found in the way the JRE processes XML. A\nremote attacker could use this flaw to supply crafted XML that would lead\nto a denial of service. (CVE-2009-2625)\n\nA flaw was found in the JRE audio system. An untrusted applet or\napplication could use this flaw to gain read access to restricted System\nproperties. (CVE-2009-2670)\n\nTwo flaws were found in the JRE proxy implementation. An untrusted applet\nor application could use these flaws to discover the usernames of users\nrunning applets and applications, or obtain web browser cookies and use\nthem for session hijacking attacks. (CVE-2009-2671, CVE-2009-2672)\n\nAn additional flaw was found in the proxy mechanism implementation. This\nflaw allowed an untrusted applet or application to bypass access\nrestrictions and communicate using non-authorized socket or URL connections\nto hosts other than the origin host. (CVE-2009-2673) \n\nAn integer overflow flaw was found in the way the JRE processes JPEG\nimages. An untrusted application could use this flaw to extend its\nprivileges, allowing it to read and write local files, as well as to\nexecute local applications with the privileges of the user running the\napplication. (CVE-2009-2674)\n\nAn integer overflow flaw was found in the JRE unpack200 functionality. An\nuntrusted applet or application could extend its privileges, allowing it to\nread and write local files, as well as to execute local applications with\nthe privileges of the user running the applet or application. (CVE-2009-2675)\n\nIt was discovered that JDK13Services grants unnecessary privileges to\ncertain object types. This could be misused by an untrusted applet or\napplication to use otherwise restricted functionality. (CVE-2009-2689)\n\nAn information disclosure flaw was found in the way private Java variables\nwere handled. An untrusted applet or application could use this flaw to\nobtain information from variables that would otherwise be private.\n(CVE-2009-2690)\n\nNote: The flaws concerning applets in this advisory, CVE-2009-2475,\nCVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675,\nCVE-2009-2689, and CVE-2009-2690, can only be triggered in\njava-1.6.0-openjdk by calling the \"appletviewer\" application.\n\nThis update also fixes the following bug:\n\n* the EVR in the java-1.6.0-openjdk package as shipped with Red Hat\nEnterprise Linux allowed the java-1.6.0-openjdk package from the EPEL\nrepository to take precedence (appear newer). Users using\njava-1.6.0-openjdk from EPEL would not have received security updates since\nOctober 2008. This update prevents the packages from EPEL from taking\nprecedence. (BZ#499079)\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1201",
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5",
"url": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5"
},
{
"category": "external",
"summary": "499079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=499079"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1201.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update",
"tracking": {
"current_release_date": "2026-03-13T01:03:29+00:00",
"generator": {
"date": "2026-03-13T01:03:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2009:1201",
"initial_release_date": "2009-08-06T21:14:00+00:00",
"revision_history": [
{
"date": "2009-08-06T21:14:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-06T17:14:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-2475",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2475"
},
{
"category": "external",
"summary": "RHBZ#513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)"
},
{
"cve": "CVE-2009-2476",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513220"
}
],
"notes": [
{
"category": "description",
"text": "The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK OpenType checks can be bypassed (6736293)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2476"
},
{
"category": "external",
"summary": "RHBZ#513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK OpenType checks can be bypassed (6736293)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2689",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513222"
}
],
"notes": [
{
"category": "description",
"text": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JDK13Services grants unnecessary privileges (6777448)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2689"
},
{
"category": "external",
"summary": "RHBZ#513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2689"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK JDK13Services grants unnecessary privileges (6777448)"
},
{
"cve": "CVE-2009-2690",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513223"
}
],
"notes": [
{
"category": "description",
"text": "The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK private variable information disclosure (6777487)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2690"
},
{
"category": "external",
"summary": "RHBZ#513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2690"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK private variable information disclosure (6777487)"
}
]
}
RHSA-2010_0043
Vulnerability from csaf_redhat - Published: 2010-01-14 16:32 - Updated: 2024-11-14 10:47The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).
Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.
Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.
Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.
Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) "limits on Font creation," aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.
Unspecified vulnerability in the lightweight HTTP server implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to cause a denial of service (probably resource consumption) for a JAX-WS service endpoint via a connection without any data, which triggers a file descriptor "leak."
Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to "deserializing applets," aka CR 6646860.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 allows user-assisted remote attackers to cause a trusted applet to run in an older JRE version, which can be used to exploit vulnerabilities in that older version, aka CR 6706490.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 does not properly parse crossdomain.xml files, which allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unknown vectors, aka CR 6798948.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a "Swing JLabel HTML parsing vulnerability," aka CR 6782871.
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.
The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.
Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.
Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.
Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.
The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to "timing attack vulnerabilities," aka Bug Id 6863503.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite Server 5.3.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.3. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the IBM Java 2 Runtime Environment.\n(CVE-2009-0217, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096,\nCVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1101,\nCVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107,\nCVE-2009-2625, CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673,\nCVE-2009-2674, CVE-2009-2675, CVE-2009-2676, CVE-2009-3865, CVE-2009-3866,\nCVE-2009-3867, CVE-2009-3868, CVE-2009-3869, CVE-2009-3871, CVE-2009-3872,\nCVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877)\n\nUsers of Red Hat Network Satellite Server 5.3 are advised to upgrade to\nthese updated java-1.6.0-ibm packages, which resolve these issues. For this\nupdate to take effect, Red Hat Network Satellite Server must be restarted\n(\"/usr/sbin/rhn-satellite restart\"), as well as all running instances of\nIBM Java.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0043",
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#low",
"url": "http://www.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "490166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490166"
},
{
"category": "external",
"summary": "490167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167"
},
{
"category": "external",
"summary": "490168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168"
},
{
"category": "external",
"summary": "490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "490174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490174"
},
{
"category": "external",
"summary": "490178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178"
},
{
"category": "external",
"summary": "492302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302"
},
{
"category": "external",
"summary": "492305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305"
},
{
"category": "external",
"summary": "492306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306"
},
{
"category": "external",
"summary": "492308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308"
},
{
"category": "external",
"summary": "492309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492309"
},
{
"category": "external",
"summary": "492310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492310"
},
{
"category": "external",
"summary": "492312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "530057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057"
},
{
"category": "external",
"summary": "530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "530062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062"
},
{
"category": "external",
"summary": "530063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063"
},
{
"category": "external",
"summary": "530067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067"
},
{
"category": "external",
"summary": "532906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906"
},
{
"category": "external",
"summary": "533211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211"
},
{
"category": "external",
"summary": "533212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212"
},
{
"category": "external",
"summary": "533214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214"
},
{
"category": "external",
"summary": "533215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0043.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Network Satellite Server IBM Java Runtime security update",
"tracking": {
"current_release_date": "2024-11-14T10:47:50+00:00",
"generator": {
"date": "2024-11-14T10:47:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2010:0043",
"initial_release_date": "2010-01-14T16:32:00+00:00",
"revision_history": [
{
"date": "2010-01-14T16:32:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-01-14T11:32:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:47:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.3 (RHEL v.4)",
"product": {
"name": "Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.3::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 5.3 (RHEL v.5)",
"product": {
"name": "Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.3::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Satellite53"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-1093",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490167"
}
],
"notes": [
{
"category": "description",
"text": "LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK remote LDAP Denial-Of-Service (6717680)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1093"
},
{
"category": "external",
"summary": "RHBZ#490167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK remote LDAP Denial-Of-Service (6717680)"
},
{
"cve": "CVE-2009-1094",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490168"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK LDAP client remote code execution (6737315)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1094"
},
{
"category": "external",
"summary": "RHBZ#490168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK LDAP client remote code execution (6737315)"
},
{
"cve": "CVE-2009-1095",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490169"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1095"
},
{
"category": "external",
"summary": "RHBZ#490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)"
},
{
"cve": "CVE-2009-1096",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490169"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1096"
},
{
"category": "external",
"summary": "RHBZ#490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)"
},
{
"cve": "CVE-2009-1097",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490174"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1097"
},
{
"category": "external",
"summary": "RHBZ#490174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490174"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1097",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1097"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997)"
},
{
"cve": "CVE-2009-1098",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490178"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK GIF processing buffer overflow vulnerability (6804998)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1098"
},
{
"category": "external",
"summary": "RHBZ#490178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK GIF processing buffer overflow vulnerability (6804998)"
},
{
"cve": "CVE-2009-1099",
"discovery_date": "2009-03-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492302"
}
],
"notes": [
{
"category": "description",
"text": "Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Type1 font processing buffer overflow vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1099"
},
{
"category": "external",
"summary": "RHBZ#492302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Type1 font processing buffer overflow vulnerability"
},
{
"cve": "CVE-2009-1100",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492305"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) \"limits on Font creation,\" aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: DoS (disk consumption) via handling of temporary font files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1100"
},
{
"category": "external",
"summary": "RHBZ#492305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: DoS (disk consumption) via handling of temporary font files"
},
{
"cve": "CVE-2009-1101",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490166"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the lightweight HTTP server implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to cause a denial of service (probably resource consumption) for a JAX-WS service endpoint via a connection without any data, which triggers a file descriptor \"leak.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1101"
},
{
"category": "external",
"summary": "RHBZ#490166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1101",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1101"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639)"
},
{
"cve": "CVE-2009-1103",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492306"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to \"deserializing applets,\" aka CR 6646860.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1103"
},
{
"category": "external",
"summary": "RHBZ#492306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103"
}
],
"release_date": "2009-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)"
},
{
"cve": "CVE-2009-1104",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492308"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1104"
},
{
"category": "external",
"summary": "RHBZ#492308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)"
},
{
"cve": "CVE-2009-1105",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492309"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 allows user-assisted remote attackers to cause a trusted applet to run in an older JRE version, which can be used to exploit vulnerabilities in that older version, aka CR 6706490.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1105"
},
{
"category": "external",
"summary": "RHBZ#492309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492309"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1105"
}
],
"release_date": "2009-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490)"
},
{
"cve": "CVE-2009-1106",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492310"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 does not properly parse crossdomain.xml files, which allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unknown vectors, aka CR 6798948.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1106"
},
{
"category": "external",
"summary": "RHBZ#492310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1106"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948)"
},
{
"cve": "CVE-2009-1107",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492312"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a \"Swing JLabel HTML parsing vulnerability,\" aka CR 6782871.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Signed applet remote misuse possibility (6782871)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1107"
},
{
"category": "external",
"summary": "RHBZ#492312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Signed applet remote misuse possibility (6782871)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
},
{
"cve": "CVE-2009-3865",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533211"
}
],
"notes": [
{
"category": "description",
"text": "The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3865"
},
{
"category": "external",
"summary": "RHBZ#533211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3865",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3865"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)"
},
{
"cve": "CVE-2009-3866",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533212"
}
],
"notes": [
{
"category": "description",
"text": "The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3866"
},
{
"category": "external",
"summary": "RHBZ#533212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3866",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)"
},
{
"cve": "CVE-2009-3867",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2009-11-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533214"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3867"
},
{
"category": "external",
"summary": "RHBZ#533214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)"
},
{
"cve": "CVE-2009-3868",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3868"
},
{
"category": "external",
"summary": "RHBZ#533215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3868",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3868"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)"
},
{
"cve": "CVE-2009-3869",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530062"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3869"
},
{
"category": "external",
"summary": "RHBZ#530062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3869",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)"
},
{
"cve": "CVE-2009-3871",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530063"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3871"
},
{
"category": "external",
"summary": "RHBZ#530063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3871",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)"
},
{
"cve": "CVE-2009-3872",
"discovery_date": "2009-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "532906"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE JPEG JFIF Decoder issue (6862969)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3872"
},
{
"category": "external",
"summary": "RHBZ#532906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3872"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JRE JPEG JFIF Decoder issue (6862969)"
},
{
"cve": "CVE-2009-3873",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530053"
}
],
"notes": [
{
"category": "description",
"text": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JPEG Image Writer quantization problem (6862968)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3873"
},
{
"category": "external",
"summary": "RHBZ#530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3873",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JPEG Image Writer quantization problem (6862968)"
},
{
"cve": "CVE-2009-3874",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530067"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ImageI/O JPEG heap overflow (6874643)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3874"
},
{
"category": "external",
"summary": "RHBZ#530067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3874"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK ImageI/O JPEG heap overflow (6874643)"
},
{
"cve": "CVE-2009-3875",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530057"
}
],
"notes": [
{
"category": "description",
"text": "The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to \"timing attack vulnerabilities,\" aka Bug Id 6863503.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3875"
},
{
"category": "external",
"summary": "RHBZ#530057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)"
},
{
"cve": "CVE-2009-3876",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3876"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
},
{
"cve": "CVE-2009-3877",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3877"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3877",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3877"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
}
]
}
RHSA-2009:1694
Vulnerability from csaf_redhat - Published: 2009-12-23 17:33 - Updated: 2026-01-28 22:34The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.
The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.
Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.
Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.
Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.
The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to "timing attack vulnerabilities," aka Bug Id 6863503.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit. These\nvulnerabilities are summarized on the IBM \"Security alerts\" page listed in\nthe References section. (CVE-2009-0217, CVE-2009-3865, CVE-2009-3866,\nCVE-2009-3867, CVE-2009-3868, CVE-2009-3869, CVE-2009-3871, CVE-2009-3872,\nCVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877)\n\nAll users of java-1.6.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.6.0 SR7 Java release. All running instances\nof IBM Java must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1694",
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
},
{
"category": "external",
"summary": "533215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "530057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057"
},
{
"category": "external",
"summary": "530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "530062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062"
},
{
"category": "external",
"summary": "530063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063"
},
{
"category": "external",
"summary": "530067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067"
},
{
"category": "external",
"summary": "532906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906"
},
{
"category": "external",
"summary": "533211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211"
},
{
"category": "external",
"summary": "533212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "533214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1694.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-ibm security update",
"tracking": {
"current_release_date": "2026-01-28T22:34:04+00:00",
"generator": {
"date": "2026-01-28T22:34:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2009:1694",
"initial_release_date": "2009-12-23T17:33:00+00:00",
"revision_history": [
{
"date": "2009-12-23T17:33:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-12-23T12:33:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-28T22:34:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-3555",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"discovery_date": "2009-10-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533125"
}
],
"notes": [
{
"category": "description",
"text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "TLS: MITM attacks via session renegotiation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3555"
},
{
"category": "external",
"summary": "RHBZ#533125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
}
],
"release_date": "2009-11-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "TLS: MITM attacks via session renegotiation"
},
{
"cve": "CVE-2009-3865",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533211"
}
],
"notes": [
{
"category": "description",
"text": "The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3865"
},
{
"category": "external",
"summary": "RHBZ#533211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3865",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3865"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)"
},
{
"cve": "CVE-2009-3866",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533212"
}
],
"notes": [
{
"category": "description",
"text": "The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3866"
},
{
"category": "external",
"summary": "RHBZ#533212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3866",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)"
},
{
"cve": "CVE-2009-3867",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2009-11-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533214"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3867"
},
{
"category": "external",
"summary": "RHBZ#533214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)"
},
{
"cve": "CVE-2009-3868",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3868"
},
{
"category": "external",
"summary": "RHBZ#533215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3868",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3868"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)"
},
{
"cve": "CVE-2009-3869",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530062"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3869"
},
{
"category": "external",
"summary": "RHBZ#530062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3869",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)"
},
{
"cve": "CVE-2009-3871",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530063"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3871"
},
{
"category": "external",
"summary": "RHBZ#530063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3871",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)"
},
{
"cve": "CVE-2009-3872",
"discovery_date": "2009-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "532906"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE JPEG JFIF Decoder issue (6862969)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3872"
},
{
"category": "external",
"summary": "RHBZ#532906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3872"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JRE JPEG JFIF Decoder issue (6862969)"
},
{
"cve": "CVE-2009-3873",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530053"
}
],
"notes": [
{
"category": "description",
"text": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JPEG Image Writer quantization problem (6862968)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3873"
},
{
"category": "external",
"summary": "RHBZ#530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3873",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JPEG Image Writer quantization problem (6862968)"
},
{
"cve": "CVE-2009-3874",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530067"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ImageI/O JPEG heap overflow (6874643)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3874"
},
{
"category": "external",
"summary": "RHBZ#530067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3874"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK ImageI/O JPEG heap overflow (6874643)"
},
{
"cve": "CVE-2009-3875",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530057"
}
],
"notes": [
{
"category": "description",
"text": "The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to \"timing attack vulnerabilities,\" aka Bug Id 6863503.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3875"
},
{
"category": "external",
"summary": "RHBZ#530057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)"
},
{
"cve": "CVE-2009-3876",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3876"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
},
{
"cve": "CVE-2009-3877",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3877"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3877",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3877"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
}
]
}
RHSA-2009_1428
Vulnerability from csaf_redhat - Published: 2009-09-08 15:43 - Updated: 2024-11-14 10:07The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated xmlsec1 packages that fix one security issue are now available for\nRed Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The XML Security Library is a C library based on libxml2 and OpenSSL. It\nimplements the XML Signature Syntax and Processing and XML Encryption\nSyntax and Processing standards. HMAC is used for message authentication\nusing cryptographic hash functions. The HMAC algorithm allows the hash\noutput to be truncated (as documented in RFC 2104).\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xmlsec1. An attacker could use this\nflaw to create a specially-crafted XML file that forges an XML signature,\nallowing the attacker to bypass authentication that is based on the XML\nSignature specification. (CVE-2009-0217)\n\nUsers of xmlsec1 should upgrade to these updated packages, which contain\na backported patch to correct this issue. After installing the updated\npackages, applications that use the XML Security Library must be restarted\nfor the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1428",
"url": "https://access.redhat.com/errata/RHSA-2009:1428"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.w3.org/TR/xmldsig-core/",
"url": "http://www.w3.org/TR/xmldsig-core/"
},
{
"category": "external",
"summary": "http://tools.ietf.org/html/rfc2104",
"url": "http://tools.ietf.org/html/rfc2104"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1428.json"
}
],
"title": "Red Hat Security Advisory: xmlsec1 security update",
"tracking": {
"current_release_date": "2024-11-14T10:07:34+00:00",
"generator": {
"date": "2024-11-14T10:07:34+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2009:1428",
"initial_release_date": "2009-09-08T15:43:00+00:00",
"revision_history": [
{
"date": "2009-09-08T15:43:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-09-08T11:47:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:07:34+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"product": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"product_id": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"product_id": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.ia64",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.ia64",
"product_id": "xmlsec1-0:1.2.6-3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.i386",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.i386",
"product_id": "xmlsec1-0:1.2.6-3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.6-3.1.i386",
"product": {
"name": "xmlsec1-devel-0:1.2.6-3.1.i386",
"product_id": "xmlsec1-devel-0:1.2.6-3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"product_id": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"product": {
"name": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"product_id": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"product_id": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.x86_64",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.x86_64",
"product_id": "xmlsec1-0:1.2.6-3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.src",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.src",
"product_id": "xmlsec1-0:1.2.6-3.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.src",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.src",
"product_id": "xmlsec1-0:1.2.9-8.1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"product": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"product_id": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"product_id": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.ppc",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.ppc",
"product_id": "xmlsec1-0:1.2.6-3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.ppc64",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.ppc64",
"product_id": "xmlsec1-0:1.2.6-3.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"product": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"product_id": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"product_id": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.s390x",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.s390x",
"product_id": "xmlsec1-0:1.2.6-3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.s390",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.s390",
"product_id": "xmlsec1-0:1.2.6-3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.6-3.1.s390",
"product": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390",
"product_id": "xmlsec1-devel-0:1.2.6-3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"product_id": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.src"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.src"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.src"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.src"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.src"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.src"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.src"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:xmlsec1-0:1.2.6-3.1.i386",
"4AS:xmlsec1-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-0:1.2.6-3.1.s390",
"4AS:xmlsec1-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-0:1.2.6-3.1.src",
"4AS:xmlsec1-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-devel-0:1.2.6-3.1.i386",
"4AS:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-devel-0:1.2.6-3.1.s390",
"4AS:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-0:1.2.6-3.1.src",
"4Desktop:xmlsec1-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-0:1.2.6-3.1.i386",
"4ES:xmlsec1-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-0:1.2.6-3.1.s390",
"4ES:xmlsec1-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-0:1.2.6-3.1.src",
"4ES:xmlsec1-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-devel-0:1.2.6-3.1.i386",
"4ES:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-devel-0:1.2.6-3.1.s390",
"4ES:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-0:1.2.6-3.1.i386",
"4WS:xmlsec1-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-0:1.2.6-3.1.s390",
"4WS:xmlsec1-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-0:1.2.6-3.1.src",
"4WS:xmlsec1-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-devel-0:1.2.6-3.1.i386",
"4WS:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-devel-0:1.2.6-3.1.s390",
"4WS:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.src",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-0:1.2.9-8.1.1.src",
"5Client:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-0:1.2.9-8.1.1.src",
"5Server:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-08T15:43:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:xmlsec1-0:1.2.6-3.1.i386",
"4AS:xmlsec1-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-0:1.2.6-3.1.s390",
"4AS:xmlsec1-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-0:1.2.6-3.1.src",
"4AS:xmlsec1-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-devel-0:1.2.6-3.1.i386",
"4AS:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-devel-0:1.2.6-3.1.s390",
"4AS:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-0:1.2.6-3.1.src",
"4Desktop:xmlsec1-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-0:1.2.6-3.1.i386",
"4ES:xmlsec1-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-0:1.2.6-3.1.s390",
"4ES:xmlsec1-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-0:1.2.6-3.1.src",
"4ES:xmlsec1-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-devel-0:1.2.6-3.1.i386",
"4ES:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-devel-0:1.2.6-3.1.s390",
"4ES:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-0:1.2.6-3.1.i386",
"4WS:xmlsec1-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-0:1.2.6-3.1.s390",
"4WS:xmlsec1-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-0:1.2.6-3.1.src",
"4WS:xmlsec1-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-devel-0:1.2.6-3.1.i386",
"4WS:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-devel-0:1.2.6-3.1.s390",
"4WS:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.src",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-0:1.2.9-8.1.1.src",
"5Client:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-0:1.2.9-8.1.1.src",
"5Server:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1428"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:xmlsec1-0:1.2.6-3.1.i386",
"4AS:xmlsec1-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-0:1.2.6-3.1.s390",
"4AS:xmlsec1-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-0:1.2.6-3.1.src",
"4AS:xmlsec1-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-devel-0:1.2.6-3.1.i386",
"4AS:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-devel-0:1.2.6-3.1.s390",
"4AS:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-0:1.2.6-3.1.src",
"4Desktop:xmlsec1-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-0:1.2.6-3.1.i386",
"4ES:xmlsec1-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-0:1.2.6-3.1.s390",
"4ES:xmlsec1-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-0:1.2.6-3.1.src",
"4ES:xmlsec1-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-devel-0:1.2.6-3.1.i386",
"4ES:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-devel-0:1.2.6-3.1.s390",
"4ES:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-0:1.2.6-3.1.i386",
"4WS:xmlsec1-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-0:1.2.6-3.1.s390",
"4WS:xmlsec1-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-0:1.2.6-3.1.src",
"4WS:xmlsec1-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-devel-0:1.2.6-3.1.i386",
"4WS:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-devel-0:1.2.6-3.1.s390",
"4WS:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.src",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-0:1.2.9-8.1.1.src",
"5Client:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-0:1.2.9-8.1.1.src",
"5Server:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
}
]
}
RHSA-2009:1636
Vulnerability from csaf_redhat - Published: 2009-12-09 23:14 - Updated: 2026-03-13 01:03The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.
Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.
Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nmultiple security issues, several bugs, and add enhancements are now\navailable for Red Hat Enterprise Linux 4 as JBEAP 4.3.0.CP07.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.3.0.CP06.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the Release Notes, available shortly from:\nhttp://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/\n\nThe following security issues are also fixed with this release:\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xml-security. An attacker could use\nthis flaw to create a specially-crafted XML file that forges an XML\nsignature, allowing the attacker to bypass authentication that is based on\nthe XML Signature specification. (CVE-2009-0217)\n\nSwatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss\nApplication Server Web Console. An attacker could use these flaws to\npresent misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-2405)\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nAn information leak flaw was found in the twiddle command line client. The\nJMX password was logged in plain text to \"twiddle.log\". (CVE-2009-3554)\n\nAn XSS flaw was found in the JMX Console. An attacker could use this flaw\nto present misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-1380)\n\nWarning: Before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1636",
"url": "https://access.redhat.com/errata/RHSA-2009:1636"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/"
},
{
"category": "external",
"summary": "510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "532117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532117"
},
{
"category": "external",
"summary": "539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1636.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update",
"tracking": {
"current_release_date": "2026-03-13T01:03:37+00:00",
"generator": {
"date": "2026-03-13T01:03:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2009:1636",
"initial_release_date": "2009-12-09T23:14:00+00:00",
"revision_history": [
{
"date": "2009-12-09T23:14:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-12-09T18:14:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"product_id": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1.12.patch03.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"product": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"product_id": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-2.GA_CP05.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"product": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"product_id": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-1.GA_CP05.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"product": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"product_id": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-9jpp.4.patch_02.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el4.src",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el4.src",
"product_id": "jgroups-1:2.4.7-1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"product_id": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11.GA_CP02.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.GA_CP01.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"product": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"product_id": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-3.SP3_CP09.4.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"product": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"product_id": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-9.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"product": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"product_id": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-4.SP2_CP07.2.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"product": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"product_id": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-6.GA_CP07.4.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"product": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"product_id": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2@2.0.2.FP-1.ep1.21.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"product": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"product_id": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-6.GA_CP07.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"product": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"product_id": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0jpp.ep1.5.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"product_id": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1.12.patch03.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"product": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"product_id": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-javadoc@2.1.4-1.12.patch03.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"product": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"product_id": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-2.GA_CP05.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"product": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"product_id": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-1.GA_CP05.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"product": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"product_id": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-9jpp.4.patch_02.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"product_id": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_id": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11.GA_CP02.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.3.1-1.11.GA_CP02.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.GA_CP01.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.3.2-2.5.GA_CP01.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"product": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"product_id": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-3.SP3_CP09.4.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"product": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"product_id": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-9.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"product": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"product_id": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-4.SP2_CP07.2.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"product": {
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"product_id": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-native42@2.0.1-4.SP2_CP07.2.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product_id": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-6.GA_CP07.4.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product": {
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product_id": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-client@4.3.0-6.GA_CP07.4.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product": {
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product_id": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-4.3.0.GA_CP07-bin@4.3.0-6.GA_CP07.4.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"product": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"product_id": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2@2.0.2.FP-1.ep1.21.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"product": {
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"product_id": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2-docs@2.0.2.FP-1.ep1.21.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"product_id": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.3.0-6.GA_CP07.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"product": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"product_id": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-6.GA_CP07.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"product_id": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0jpp.ep1.5.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch"
},
"product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src"
},
"product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch"
},
"product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src"
},
"product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch"
},
"product_reference": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch"
},
"product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src"
},
"product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch"
},
"product_reference": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch"
},
"product_reference": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch"
},
"product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src"
},
"product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src"
},
"product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src"
},
"product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch"
},
"product_reference": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src"
},
"product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch"
},
"product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src"
},
"product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch"
},
"product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src"
},
"product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch"
},
"product_reference": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch"
},
"product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src"
},
"product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch"
},
"product_reference": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch"
},
"product_reference": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch"
},
"product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src"
},
"product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src"
},
"product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src"
},
"product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch"
},
"product_reference": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src"
},
"product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1636"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-1380",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511224"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jbossas JMX-Console cross-site-scripting in filter parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1380"
},
{
"category": "external",
"summary": "RHBZ#511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1380"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380"
}
],
"release_date": "2009-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1636"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "jbossas JMX-Console cross-site-scripting in filter parameter"
},
{
"cve": "CVE-2009-2405",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510023"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss Application Server Web Console XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect Red Hat JBoss Enterprise Application Platform 5 or 6. Older versions of the community JBoss Application Server 5.x may be affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2405"
},
{
"category": "external",
"summary": "RHBZ#510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2405"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405"
}
],
"release_date": "2009-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1636"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss Application Server Web Console XSS"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1636"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-3554",
"discovery_date": "2009-10-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "539495"
}
],
"notes": [
{
"category": "description",
"text": "Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss EAP Twiddle logs the JMX password",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3554"
},
{
"category": "external",
"summary": "RHBZ#539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554"
}
],
"release_date": "2009-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1636"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss EAP Twiddle logs the JMX password"
}
]
}
RHSA-2009:1200
Vulnerability from csaf_redhat - Published: 2009-08-06 20:41 - Updated: 2026-03-13 01:03The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.
The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in "old zip and certificate handling" and have unspecified other impact via unknown vectors.
The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet.
The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP).
Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-sun packages that correct several security issues are\nnow available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and\nthe Sun Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 6 Runtime\nEnvironment and the Sun Java 6 Software Development Kit. These\nvulnerabilities are summarized on the \"Advance notification of Security\nUpdates for Java SE\" page from Sun Microsystems, listed in the References\nsection. (CVE-2009-0217, CVE-2009-2475, CVE-2009-2476, CVE-2009-2625,\nCVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2674,\nCVE-2009-2675, CVE-2009-2676, CVE-2009-2690)\n\nUsers of java-1.6.0-sun should upgrade to these updated packages, which\ncorrect these issues. All running instances of Sun Java must be restarted\nfor the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1200",
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5",
"url": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5"
},
{
"category": "external",
"summary": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1200.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-sun security update",
"tracking": {
"current_release_date": "2026-03-13T01:03:29+00:00",
"generator": {
"date": "2026-03-13T01:03:29+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2009:1200",
"initial_release_date": "2009-08-06T20:41:00+00:00",
"revision_history": [
{
"date": "2009-08-06T20:41:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-06T16:41:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:29+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i586"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-2475",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2475"
},
{
"category": "external",
"summary": "RHBZ#513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)"
},
{
"cve": "CVE-2009-2476",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513220"
}
],
"notes": [
{
"category": "description",
"text": "The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK OpenType checks can be bypassed (6736293)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2476"
},
{
"category": "external",
"summary": "RHBZ#513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK OpenType checks can be bypassed (6736293)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
},
{
"cve": "CVE-2009-2690",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513223"
}
],
"notes": [
{
"category": "description",
"text": "The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK private variable information disclosure (6777487)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2690"
},
{
"category": "external",
"summary": "RHBZ#513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2690"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK private variable information disclosure (6777487)"
},
{
"cve": "CVE-2009-2716",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516812"
}
],
"notes": [
{
"category": "description",
"text": "The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in \"old zip and certificate handling\" and have unspecified other impact via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK improper version selection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2716"
},
{
"category": "external",
"summary": "RHBZ#516812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2716"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK improper version selection"
},
{
"cve": "CVE-2009-2718",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516815"
}
],
"notes": [
{
"category": "description",
"text": "The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK reposition of untrusted applet security icon in X11",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2718"
},
{
"category": "external",
"summary": "RHBZ#516815",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516815"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2718"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK reposition of untrusted applet security icon in X11"
},
{
"cve": "CVE-2009-2719",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516820"
}
],
"notes": [
{
"category": "description",
"text": "The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK DoS with crafted .jnlp file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2719"
},
{
"category": "external",
"summary": "RHBZ#516820",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516820"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2719"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK DoS with crafted .jnlp file"
},
{
"cve": "CVE-2009-2720",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516823"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK DoS with Swing Synthcontext implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2720"
},
{
"category": "external",
"summary": "RHBZ#516823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK DoS with Swing Synthcontext implementation"
}
]
}
RHSA-2009:1428
Vulnerability from csaf_redhat - Published: 2009-09-08 15:43 - Updated: 2026-01-28 22:33The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
| URL | Category | |||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated xmlsec1 packages that fix one security issue are now available for\nRed Hat Enterprise Linux 4 and 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The XML Security Library is a C library based on libxml2 and OpenSSL. It\nimplements the XML Signature Syntax and Processing and XML Encryption\nSyntax and Processing standards. HMAC is used for message authentication\nusing cryptographic hash functions. The HMAC algorithm allows the hash\noutput to be truncated (as documented in RFC 2104).\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xmlsec1. An attacker could use this\nflaw to create a specially-crafted XML file that forges an XML signature,\nallowing the attacker to bypass authentication that is based on the XML\nSignature specification. (CVE-2009-0217)\n\nUsers of xmlsec1 should upgrade to these updated packages, which contain\na backported patch to correct this issue. After installing the updated\npackages, applications that use the XML Security Library must be restarted\nfor the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1428",
"url": "https://access.redhat.com/errata/RHSA-2009:1428"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.w3.org/TR/xmldsig-core/",
"url": "http://www.w3.org/TR/xmldsig-core/"
},
{
"category": "external",
"summary": "http://tools.ietf.org/html/rfc2104",
"url": "http://tools.ietf.org/html/rfc2104"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1428.json"
}
],
"title": "Red Hat Security Advisory: xmlsec1 security update",
"tracking": {
"current_release_date": "2026-01-28T22:33:59+00:00",
"generator": {
"date": "2026-01-28T22:33:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2009:1428",
"initial_release_date": "2009-09-08T15:43:00+00:00",
"revision_history": [
{
"date": "2009-09-08T15:43:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-09-08T11:47:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-28T22:33:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"product": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"product_id": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"product_id": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.ia64",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.ia64",
"product_id": "xmlsec1-0:1.2.6-3.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.i386",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.i386",
"product_id": "xmlsec1-0:1.2.6-3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.6-3.1.i386",
"product": {
"name": "xmlsec1-devel-0:1.2.6-3.1.i386",
"product_id": "xmlsec1-devel-0:1.2.6-3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"product_id": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.i386",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.i386",
"product_id": "xmlsec1-0:1.2.9-8.1.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"product": {
"name": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"product_id": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"product_id": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.x86_64",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.x86_64",
"product_id": "xmlsec1-0:1.2.6-3.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.x86_64",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.x86_64",
"product_id": "xmlsec1-0:1.2.9-8.1.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.src",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.src",
"product_id": "xmlsec1-0:1.2.6-3.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.src",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.src",
"product_id": "xmlsec1-0:1.2.9-8.1.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"product": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"product_id": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"product_id": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.ppc",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.ppc",
"product_id": "xmlsec1-0:1.2.6-3.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.ppc64",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.ppc64",
"product_id": "xmlsec1-0:1.2.6-3.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"product": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"product_id": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"product_id": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.s390x",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.s390x",
"product_id": "xmlsec1-0:1.2.6-3.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"product_id": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.6-3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"product": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"product_id": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.6-3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.6-3.1.s390",
"product": {
"name": "xmlsec1-0:1.2.6-3.1.s390",
"product_id": "xmlsec1-0:1.2.6-3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.6-3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.6-3.1.s390",
"product": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390",
"product_id": "xmlsec1-devel-0:1.2.6-3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.6-3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"product_id": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.6-3.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls-devel@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss-devel@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-gnutls@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl-devel@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-debuginfo@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-openssl@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-nss-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-nss@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1@1.2.9-8.1.1?arch=s390"
}
}
},
{
"category": "product_version",
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390",
"product": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390",
"product_id": "xmlsec1-devel-0:1.2.9-8.1.1.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlsec1-devel@1.2.9-8.1.1?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.src"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.src"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.src"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.src"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.src"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.src"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.src"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64"
},
"product_reference": "xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:xmlsec1-0:1.2.6-3.1.i386",
"4AS:xmlsec1-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-0:1.2.6-3.1.s390",
"4AS:xmlsec1-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-0:1.2.6-3.1.src",
"4AS:xmlsec1-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-devel-0:1.2.6-3.1.i386",
"4AS:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-devel-0:1.2.6-3.1.s390",
"4AS:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-0:1.2.6-3.1.src",
"4Desktop:xmlsec1-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-0:1.2.6-3.1.i386",
"4ES:xmlsec1-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-0:1.2.6-3.1.s390",
"4ES:xmlsec1-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-0:1.2.6-3.1.src",
"4ES:xmlsec1-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-devel-0:1.2.6-3.1.i386",
"4ES:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-devel-0:1.2.6-3.1.s390",
"4ES:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-0:1.2.6-3.1.i386",
"4WS:xmlsec1-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-0:1.2.6-3.1.s390",
"4WS:xmlsec1-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-0:1.2.6-3.1.src",
"4WS:xmlsec1-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-devel-0:1.2.6-3.1.i386",
"4WS:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-devel-0:1.2.6-3.1.s390",
"4WS:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.src",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-0:1.2.9-8.1.1.src",
"5Client:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-0:1.2.9-8.1.1.src",
"5Server:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-09-08T15:43:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:xmlsec1-0:1.2.6-3.1.i386",
"4AS:xmlsec1-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-0:1.2.6-3.1.s390",
"4AS:xmlsec1-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-0:1.2.6-3.1.src",
"4AS:xmlsec1-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-devel-0:1.2.6-3.1.i386",
"4AS:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-devel-0:1.2.6-3.1.s390",
"4AS:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-0:1.2.6-3.1.src",
"4Desktop:xmlsec1-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-0:1.2.6-3.1.i386",
"4ES:xmlsec1-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-0:1.2.6-3.1.s390",
"4ES:xmlsec1-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-0:1.2.6-3.1.src",
"4ES:xmlsec1-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-devel-0:1.2.6-3.1.i386",
"4ES:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-devel-0:1.2.6-3.1.s390",
"4ES:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-0:1.2.6-3.1.i386",
"4WS:xmlsec1-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-0:1.2.6-3.1.s390",
"4WS:xmlsec1-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-0:1.2.6-3.1.src",
"4WS:xmlsec1-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-devel-0:1.2.6-3.1.i386",
"4WS:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-devel-0:1.2.6-3.1.s390",
"4WS:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.src",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-0:1.2.9-8.1.1.src",
"5Client:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-0:1.2.9-8.1.1.src",
"5Server:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1428"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:xmlsec1-0:1.2.6-3.1.i386",
"4AS:xmlsec1-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-0:1.2.6-3.1.s390",
"4AS:xmlsec1-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-0:1.2.6-3.1.src",
"4AS:xmlsec1-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-devel-0:1.2.6-3.1.i386",
"4AS:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-devel-0:1.2.6-3.1.s390",
"4AS:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4AS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-0:1.2.6-3.1.src",
"4Desktop:xmlsec1-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4Desktop:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-0:1.2.6-3.1.i386",
"4ES:xmlsec1-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-0:1.2.6-3.1.s390",
"4ES:xmlsec1-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-0:1.2.6-3.1.src",
"4ES:xmlsec1-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-devel-0:1.2.6-3.1.i386",
"4ES:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-devel-0:1.2.6-3.1.s390",
"4ES:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4ES:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-0:1.2.6-3.1.i386",
"4WS:xmlsec1-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-0:1.2.6-3.1.s390",
"4WS:xmlsec1-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-0:1.2.6-3.1.src",
"4WS:xmlsec1-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.i386",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-debuginfo-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-devel-0:1.2.6-3.1.i386",
"4WS:xmlsec1-devel-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-devel-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-devel-0:1.2.6-3.1.s390",
"4WS:xmlsec1-devel-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-devel-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.i386",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.ppc64",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.s390",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-openssl-0:1.2.6-3.1.x86_64",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.i386",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ia64",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.ppc",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.s390x",
"4WS:xmlsec1-openssl-devel-0:1.2.6-3.1.x86_64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.src",
"5Client-Workstation:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Client-Workstation:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-0:1.2.9-8.1.1.src",
"5Client:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Client:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-0:1.2.9-8.1.1.src",
"5Server:xmlsec1-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-debuginfo-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-gnutls-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-gnutls-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-nss-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-nss-devel-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-openssl-0:1.2.9-8.1.1.x86_64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.i386",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ia64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.ppc64",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.s390x",
"5Server:xmlsec1-openssl-devel-0:1.2.9-8.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
}
]
}
RHSA-2009:1637
Vulnerability from csaf_redhat - Published: 2009-12-09 23:32 - Updated: 2026-03-13 01:03The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.
Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.
Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nmultiple security issues, several bugs, and add enhancements are now\navailable for Red Hat Enterprise Linux 4 as JBEAP 4.2.0.CP08.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.2.0.CP07.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the Release Notes, available shortly from:\nhttp://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/\n\nThe following security issues are also fixed with this release:\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xml-security. An attacker could use\nthis flaw to create a specially-crafted XML file that forges an XML\nsignature, allowing the attacker to bypass authentication that is based on\nthe XML Signature specification. (CVE-2009-0217)\n\nSwatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss\nApplication Server Web Console. An attacker could use these flaws to\npresent misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-2405)\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nAn information leak flaw was found in the twiddle command line client. The\nJMX password was logged in plain text to \"twiddle.log\". (CVE-2009-3554)\n\nAn XSS flaw was found in the JMX Console. An attacker could use this flaw\nto present misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-1380)\n\nWarning: Before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1637",
"url": "https://access.redhat.com/errata/RHSA-2009:1637"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/"
},
{
"category": "external",
"summary": "510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "532116",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532116"
},
{
"category": "external",
"summary": "539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1637.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP08 update",
"tracking": {
"current_release_date": "2026-03-13T01:03:37+00:00",
"generator": {
"date": "2026-03-13T01:03:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2009:1637",
"initial_release_date": "2009-12-09T23:32:00+00:00",
"revision_history": [
{
"date": "2009-12-09T23:32:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-12-09T18:32:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"product": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"product_id": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-9jpp.4.patch_02.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el4.src",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el4.src",
"product_id": "jgroups-1:2.4.7-1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"product_id": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11.GA_CP02.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.GA_CP01.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"product": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"product_id": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-9.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"product": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"product_id": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-5.GA_CP08.5.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"product_id": "jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.22.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"product": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"product_id": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-6.GA_CP08.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"product": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"product_id": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0jpp.ep1.5.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"product": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"product_id": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-9jpp.4.patch_02.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"product_id": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_id": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11.GA_CP02.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.3.1-1.11.GA_CP02.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.GA_CP01.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.3.2-2.5.GA_CP01.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"product": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"product_id": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-9.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product_id": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-5.GA_CP08.5.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product": {
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product_id": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-client@4.2.0-5.GA_CP08.5.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product": {
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product_id": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-4.2.0.GA_CP08-bin@4.2.0-5.GA_CP08.5.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"product_id": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.22.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.22.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"product": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"product_id": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-6.GA_CP08.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"product_id": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-6.GA_CP08.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"product_id": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0jpp.ep1.5.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch"
},
"product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src"
},
"product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch"
},
"product_reference": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch"
},
"product_reference": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch"
},
"product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src"
},
"product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch"
},
"product_reference": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch"
},
"product_reference": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1637"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-1380",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511224"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jbossas JMX-Console cross-site-scripting in filter parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1380"
},
{
"category": "external",
"summary": "RHBZ#511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1380"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380"
}
],
"release_date": "2009-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1637"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "jbossas JMX-Console cross-site-scripting in filter parameter"
},
{
"cve": "CVE-2009-2405",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510023"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss Application Server Web Console XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect Red Hat JBoss Enterprise Application Platform 5 or 6. Older versions of the community JBoss Application Server 5.x may be affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2405"
},
{
"category": "external",
"summary": "RHBZ#510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2405"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405"
}
],
"release_date": "2009-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1637"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss Application Server Web Console XSS"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1637"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-3554",
"discovery_date": "2009-10-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "539495"
}
],
"notes": [
{
"category": "description",
"text": "Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss EAP Twiddle logs the JMX password",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3554"
},
{
"category": "external",
"summary": "RHBZ#539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554"
}
],
"release_date": "2009-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1637"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss EAP Twiddle logs the JMX password"
}
]
}
RHSA-2009_1649
Vulnerability from csaf_redhat - Published: 2009-12-09 23:51 - Updated: 2024-12-15 18:16The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.
Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nmultiple security issues, several bugs, and add enhancements are now\navailable for Red Hat Enterprise Linux 5 as JBEAP 4.3.0.CP07.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.3.0.CP06.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the Release Notes, available shortly from:\nhttp://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/\n\nThe following security issues are also fixed with this release:\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xml-security. An attacker could use\nthis flaw to create a specially-crafted XML file that forges an XML\nsignature, allowing the attacker to bypass authentication that is based on\nthe XML Signature specification. (CVE-2009-0217)\n\nSwatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss\nApplication Server Web Console. An attacker could use these flaws to\npresent misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-2405)\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nAn information leak flaw was found in the twiddle command line client. The\nJMX password was logged in plain text to \"twiddle.log\". (CVE-2009-3554)\n\nAn XSS flaw was found in the JMX Console. An attacker could use this flaw\nto present misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-1380)\n\nWarning: Before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1649",
"url": "https://access.redhat.com/errata/RHSA-2009:1649"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/"
},
{
"category": "external",
"summary": "510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "532113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532113"
},
{
"category": "external",
"summary": "539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1649.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update",
"tracking": {
"current_release_date": "2024-12-15T18:16:28+00:00",
"generator": {
"date": "2024-12-15T18:16:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2009:1649",
"initial_release_date": "2009-12-09T23:51:00+00:00",
"revision_history": [
{
"date": "2009-12-09T23:51:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-12-09T18:51:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-15T18:16:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el5.src",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el5.src",
"product_id": "jgroups-1:2.4.7-1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"product_id": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11GA_CP02.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"product": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"product_id": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-3.SP3_CP09.4.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"product_id": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1.12.patch03.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"product": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"product_id": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-2.GA_CP05.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"product": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"product_id": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-1.GA_CP05.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"product": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"product_id": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-4.SP2_CP07.2.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"product": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"product_id": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-6.GA_CP07.ep1.3.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"product": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"product_id": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2@2.0.2.FP-1.ep1.18.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"product": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"product_id": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-6.GA_CP07.4.2.ep1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"product_id": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.3.1-1.11GA_CP02.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_id": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11GA_CP02.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"product": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"product_id": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-3.SP3_CP09.4.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"product": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"product_id": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-javadoc@2.1.4-1.12.patch03.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"product_id": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1.12.patch03.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"product": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"product_id": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-2.GA_CP05.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"product": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"product_id": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-1.GA_CP05.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"product": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"product_id": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-4.SP2_CP07.2.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"product": {
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"product_id": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-native42@2.0.1-4.SP2_CP07.2.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.3.2-2.5.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.3.0-6.GA_CP07.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-6.GA_CP07.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"product": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"product_id": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2@2.0.2.FP-1.ep1.18.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"product": {
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"product_id": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2-docs@2.0.2.FP-1.ep1.18.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product": {
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product_id": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-client@4.3.0-6.GA_CP07.4.2.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product_id": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-6.GA_CP07.4.2.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product": {
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product_id": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-4.3.0.GA_CP07-bin@4.3.0-6.GA_CP07.4.2.ep1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch"
},
"product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src"
},
"product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch"
},
"product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src"
},
"product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch"
},
"product_reference": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch"
},
"product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src"
},
"product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch"
},
"product_reference": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch"
},
"product_reference": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch"
},
"product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src"
},
"product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src"
},
"product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src"
},
"product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch"
},
"product_reference": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src"
},
"product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1649"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-1380",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511224"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jbossas JMX-Console cross-site-scripting in filter parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1380"
},
{
"category": "external",
"summary": "RHBZ#511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1380"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380"
}
],
"release_date": "2009-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1649"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "jbossas JMX-Console cross-site-scripting in filter parameter"
},
{
"cve": "CVE-2009-2405",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510023"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss Application Server Web Console XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect Red Hat JBoss Enterprise Application Platform 5 or 6. Older versions of the community JBoss Application Server 5.x may be affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2405"
},
{
"category": "external",
"summary": "RHBZ#510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2405"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405"
}
],
"release_date": "2009-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1649"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss Application Server Web Console XSS"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1649"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-3554",
"discovery_date": "2009-10-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "539495"
}
],
"notes": [
{
"category": "description",
"text": "Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss EAP Twiddle logs the JMX password",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3554"
},
{
"category": "external",
"summary": "RHBZ#539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554"
}
],
"release_date": "2009-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1649"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss EAP Twiddle logs the JMX password"
}
]
}
RHSA-2010:0043
Vulnerability from csaf_redhat - Published: 2010-01-14 16:32 - Updated: 2026-03-13 01:03The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).
Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.
Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.
Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.
Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) "limits on Font creation," aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.
Unspecified vulnerability in the lightweight HTTP server implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to cause a denial of service (probably resource consumption) for a JAX-WS service endpoint via a connection without any data, which triggers a file descriptor "leak."
Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to "deserializing applets," aka CR 6646860.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 allows user-assisted remote attackers to cause a trusted applet to run in an older JRE version, which can be used to exploit vulnerabilities in that older version, aka CR 6706490.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 does not properly parse crossdomain.xml files, which allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unknown vectors, aka CR 6798948.
The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a "Swing JLabel HTML parsing vulnerability," aka CR 6782871.
Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.
The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.
Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.
Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.
Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.
The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to "timing attack vulnerabilities," aka Bug Id 6863503.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Low"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite Server 5.3.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.3. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the IBM Java 2 Runtime Environment.\n(CVE-2009-0217, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096,\nCVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1101,\nCVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107,\nCVE-2009-2625, CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673,\nCVE-2009-2674, CVE-2009-2675, CVE-2009-2676, CVE-2009-3865, CVE-2009-3866,\nCVE-2009-3867, CVE-2009-3868, CVE-2009-3869, CVE-2009-3871, CVE-2009-3872,\nCVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877)\n\nUsers of Red Hat Network Satellite Server 5.3 are advised to upgrade to\nthese updated java-1.6.0-ibm packages, which resolve these issues. For this\nupdate to take effect, Red Hat Network Satellite Server must be restarted\n(\"/usr/sbin/rhn-satellite restart\"), as well as all running instances of\nIBM Java.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0043",
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#low",
"url": "http://www.redhat.com/security/updates/classification/#low"
},
{
"category": "external",
"summary": "490166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490166"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "533212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212"
},
{
"category": "external",
"summary": "490167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167"
},
{
"category": "external",
"summary": "490168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168"
},
{
"category": "external",
"summary": "490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "490174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490174"
},
{
"category": "external",
"summary": "490178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178"
},
{
"category": "external",
"summary": "492302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302"
},
{
"category": "external",
"summary": "492305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305"
},
{
"category": "external",
"summary": "492306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306"
},
{
"category": "external",
"summary": "492308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308"
},
{
"category": "external",
"summary": "492309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492309"
},
{
"category": "external",
"summary": "492310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492310"
},
{
"category": "external",
"summary": "492312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "530057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057"
},
{
"category": "external",
"summary": "530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "530062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062"
},
{
"category": "external",
"summary": "530063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063"
},
{
"category": "external",
"summary": "530067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067"
},
{
"category": "external",
"summary": "532906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906"
},
{
"category": "external",
"summary": "533211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211"
},
{
"category": "external",
"summary": "533214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214"
},
{
"category": "external",
"summary": "533215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0043.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Network Satellite Server IBM Java Runtime security update",
"tracking": {
"current_release_date": "2026-03-13T01:03:40+00:00",
"generator": {
"date": "2026-03-13T01:03:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2010:0043",
"initial_release_date": "2010-01-14T16:32:00+00:00",
"revision_history": [
{
"date": "2010-01-14T16:32:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-01-14T11:32:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 5.3 (RHEL v.4)",
"product": {
"name": "Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.3::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 5.3 (RHEL v.5)",
"product": {
"name": "Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:network_satellite:5.3::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.4)",
"product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-RHNSAT5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Satellite53"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.5)",
"product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Satellite53"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-1093",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490167"
}
],
"notes": [
{
"category": "description",
"text": "LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK remote LDAP Denial-Of-Service (6717680)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1093"
},
{
"category": "external",
"summary": "RHBZ#490167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1093",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK remote LDAP Denial-Of-Service (6717680)"
},
{
"cve": "CVE-2009-1094",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490168"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK LDAP client remote code execution (6737315)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1094"
},
{
"category": "external",
"summary": "RHBZ#490168",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK LDAP client remote code execution (6737315)"
},
{
"cve": "CVE-2009-1095",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490169"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1095"
},
{
"category": "external",
"summary": "RHBZ#490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)"
},
{
"cve": "CVE-2009-1096",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490169"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1096"
},
{
"category": "external",
"summary": "RHBZ#490169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1096",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1096"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)"
},
{
"cve": "CVE-2009-1097",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490174"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1097"
},
{
"category": "external",
"summary": "RHBZ#490174",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490174"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1097",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1097"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1097",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1097"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997)"
},
{
"cve": "CVE-2009-1098",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490178"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK GIF processing buffer overflow vulnerability (6804998)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1098"
},
{
"category": "external",
"summary": "RHBZ#490178",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1098",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1098"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK GIF processing buffer overflow vulnerability (6804998)"
},
{
"cve": "CVE-2009-1099",
"discovery_date": "2009-03-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492302"
}
],
"notes": [
{
"category": "description",
"text": "Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Type1 font processing buffer overflow vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1099"
},
{
"category": "external",
"summary": "RHBZ#492302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1099",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1099"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Type1 font processing buffer overflow vulnerability"
},
{
"cve": "CVE-2009-1100",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492305"
}
],
"notes": [
{
"category": "description",
"text": "Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) \"limits on Font creation,\" aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: DoS (disk consumption) via handling of temporary font files",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1100"
},
{
"category": "external",
"summary": "RHBZ#492305",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1100",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1100"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK: DoS (disk consumption) via handling of temporary font files"
},
{
"cve": "CVE-2009-1101",
"discovery_date": "2009-03-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "490166"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the lightweight HTTP server implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to cause a denial of service (probably resource consumption) for a JAX-WS service endpoint via a connection without any data, which triggers a file descriptor \"leak.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1101"
},
{
"category": "external",
"summary": "RHBZ#490166",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=490166"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1101",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1101"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1101",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1101"
}
],
"release_date": "2009-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639)"
},
{
"cve": "CVE-2009-1103",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492306"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to \"deserializing applets,\" aka CR 6646860.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1103"
},
{
"category": "external",
"summary": "RHBZ#492306",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1103",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1103"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103"
}
],
"release_date": "2009-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)"
},
{
"cve": "CVE-2009-1104",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492308"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1104"
},
{
"category": "external",
"summary": "RHBZ#492308",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1104",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)"
},
{
"cve": "CVE-2009-1105",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492309"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 allows user-assisted remote attackers to cause a trusted applet to run in an older JRE version, which can be used to exploit vulnerabilities in that older version, aka CR 6706490.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1105"
},
{
"category": "external",
"summary": "RHBZ#492309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492309"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1105",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1105"
}
],
"release_date": "2009-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490)"
},
{
"cve": "CVE-2009-1106",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492310"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 does not properly parse crossdomain.xml files, which allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unknown vectors, aka CR 6798948.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1106"
},
{
"category": "external",
"summary": "RHBZ#492310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492310"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1106",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1106"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948)"
},
{
"cve": "CVE-2009-1107",
"discovery_date": "2009-03-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "492312"
}
],
"notes": [
{
"category": "description",
"text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a \"Swing JLabel HTML parsing vulnerability,\" aka CR 6782871.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK: Signed applet remote misuse possibility (6782871)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1107"
},
{
"category": "external",
"summary": "RHBZ#492312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1107",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1107"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107"
}
],
"release_date": "2009-03-23T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK: Signed applet remote misuse possibility (6782871)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
},
{
"cve": "CVE-2009-3865",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533211"
}
],
"notes": [
{
"category": "description",
"text": "The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3865"
},
{
"category": "external",
"summary": "RHBZ#533211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3865",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3865"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)"
},
{
"cve": "CVE-2009-3866",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533212"
}
],
"notes": [
{
"category": "description",
"text": "The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3866"
},
{
"category": "external",
"summary": "RHBZ#533212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3866",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)"
},
{
"cve": "CVE-2009-3867",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2009-11-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533214"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3867"
},
{
"category": "external",
"summary": "RHBZ#533214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)"
},
{
"cve": "CVE-2009-3868",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3868"
},
{
"category": "external",
"summary": "RHBZ#533215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3868",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3868"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)"
},
{
"cve": "CVE-2009-3869",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530062"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3869"
},
{
"category": "external",
"summary": "RHBZ#530062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3869",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)"
},
{
"cve": "CVE-2009-3871",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530063"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3871"
},
{
"category": "external",
"summary": "RHBZ#530063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3871",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)"
},
{
"cve": "CVE-2009-3872",
"discovery_date": "2009-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "532906"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE JPEG JFIF Decoder issue (6862969)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3872"
},
{
"category": "external",
"summary": "RHBZ#532906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3872"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JRE JPEG JFIF Decoder issue (6862969)"
},
{
"cve": "CVE-2009-3873",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530053"
}
],
"notes": [
{
"category": "description",
"text": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JPEG Image Writer quantization problem (6862968)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3873"
},
{
"category": "external",
"summary": "RHBZ#530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3873",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JPEG Image Writer quantization problem (6862968)"
},
{
"cve": "CVE-2009-3874",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530067"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ImageI/O JPEG heap overflow (6874643)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3874"
},
{
"category": "external",
"summary": "RHBZ#530067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3874"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK ImageI/O JPEG heap overflow (6874643)"
},
{
"cve": "CVE-2009-3875",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530057"
}
],
"notes": [
{
"category": "description",
"text": "The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to \"timing attack vulnerabilities,\" aka Bug Id 6863503.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3875"
},
{
"category": "external",
"summary": "RHBZ#530057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)"
},
{
"cve": "CVE-2009-3876",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3876"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
},
{
"cve": "CVE-2009-3877",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3877"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3877",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3877"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-01-14T16:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0043"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src",
"4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src",
"5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
}
]
}
RHSA-2009_1694
Vulnerability from csaf_redhat - Published: 2009-12-23 17:33 - Updated: 2024-11-14 10:47The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.
The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.
Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.
Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.
Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.
The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to "timing attack vulnerabilities," aka Bug Id 6863503.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.
Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit. These\nvulnerabilities are summarized on the IBM \"Security alerts\" page listed in\nthe References section. (CVE-2009-0217, CVE-2009-3865, CVE-2009-3866,\nCVE-2009-3867, CVE-2009-3868, CVE-2009-3869, CVE-2009-3871, CVE-2009-3872,\nCVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877)\n\nAll users of java-1.6.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.6.0 SR7 Java release. All running instances\nof IBM Java must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1694",
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://www.ibm.com/developerworks/java/jdk/alerts/",
"url": "http://www.ibm.com/developerworks/java/jdk/alerts/"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "530057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057"
},
{
"category": "external",
"summary": "530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "530062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062"
},
{
"category": "external",
"summary": "530063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063"
},
{
"category": "external",
"summary": "530067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067"
},
{
"category": "external",
"summary": "532906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906"
},
{
"category": "external",
"summary": "533211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211"
},
{
"category": "external",
"summary": "533212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212"
},
{
"category": "external",
"summary": "533214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214"
},
{
"category": "external",
"summary": "533215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1694.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-ibm security update",
"tracking": {
"current_release_date": "2024-11-14T10:47:58+00:00",
"generator": {
"date": "2024-11-14T10:47:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2009:1694",
"initial_release_date": "2009-12-23T17:33:00+00:00",
"revision_history": [
{
"date": "2009-12-23T17:33:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-12-23T12:33:56+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:47:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.3.el4?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.2.el5?arch=ppc64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.7-1jpp.3.el4?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.7-1jpp.2.el5?arch=ppc\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"product": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.7-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.7-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.7-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"product": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=s390\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
},
"product_reference": "java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-3555",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"discovery_date": "2009-10-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533125"
}
],
"notes": [
{
"category": "description",
"text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "TLS: MITM attacks via session renegotiation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3555"
},
{
"category": "external",
"summary": "RHBZ#533125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
}
],
"release_date": "2009-11-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "TLS: MITM attacks via session renegotiation"
},
{
"cve": "CVE-2009-3865",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533211"
}
],
"notes": [
{
"category": "description",
"text": "The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3865"
},
{
"category": "external",
"summary": "RHBZ#533211",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3865",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3865"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)"
},
{
"cve": "CVE-2009-3866",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533212"
}
],
"notes": [
{
"category": "description",
"text": "The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3866"
},
{
"category": "external",
"summary": "RHBZ#533212",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3866",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3866"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)"
},
{
"cve": "CVE-2009-3867",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2009-11-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533214"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3867"
},
{
"category": "external",
"summary": "RHBZ#533214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3867",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3867"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)"
},
{
"cve": "CVE-2009-3868",
"discovery_date": "2009-11-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3868"
},
{
"category": "external",
"summary": "RHBZ#533215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3868",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3868"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)"
},
{
"cve": "CVE-2009-3869",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530062"
}
],
"notes": [
{
"category": "description",
"text": "Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3869"
},
{
"category": "external",
"summary": "RHBZ#530062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3869",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3869"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)"
},
{
"cve": "CVE-2009-3871",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530063"
}
],
"notes": [
{
"category": "description",
"text": "Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3871"
},
{
"category": "external",
"summary": "RHBZ#530063",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3871",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3871"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)"
},
{
"cve": "CVE-2009-3872",
"discovery_date": "2009-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "532906"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE JPEG JFIF Decoder issue (6862969)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3872"
},
{
"category": "external",
"summary": "RHBZ#532906",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3872"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "JRE JPEG JFIF Decoder issue (6862969)"
},
{
"cve": "CVE-2009-3873",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530053"
}
],
"notes": [
{
"category": "description",
"text": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JPEG Image Writer quantization problem (6862968)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3873"
},
{
"category": "external",
"summary": "RHBZ#530053",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3873",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3873"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK JPEG Image Writer quantization problem (6862968)"
},
{
"cve": "CVE-2009-3874",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530067"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ImageI/O JPEG heap overflow (6874643)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3874"
},
{
"category": "external",
"summary": "RHBZ#530067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3874"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK ImageI/O JPEG heap overflow (6874643)"
},
{
"cve": "CVE-2009-3875",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530057"
}
],
"notes": [
{
"category": "description",
"text": "The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to \"timing attack vulnerabilities,\" aka Bug Id 6863503.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3875"
},
{
"category": "external",
"summary": "RHBZ#530057",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)"
},
{
"cve": "CVE-2009-3876",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3876"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3876",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
},
{
"cve": "CVE-2009-3877",
"discovery_date": "2009-10-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "530061"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3877"
},
{
"category": "external",
"summary": "RHBZ#530061",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3877",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3877"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877"
}
],
"release_date": "2009-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-23T17:33:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1694"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.3.el4.x86_64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.i386",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.ppc64",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.s390x",
"4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.3.el4.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.7-1jpp.2.el5.x86_64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.i386",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.ppc64",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.s390x",
"5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.7-1jpp.2.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877"
}
]
}
RHSA-2009:1650
Vulnerability from csaf_redhat - Published: 2009-12-10 00:03 - Updated: 2026-03-13 01:03The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.
Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.
Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nmultiple security issues, several bugs, and add enhancements are now\navailable for Red Hat Enterprise Linux 5 as JBEAP 4.2.0.CP08.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.2.0.CP07.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the Release Notes, available shortly from:\nhttp://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/\n\nThe following security issues are also fixed with this release:\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xml-security. An attacker could use\nthis flaw to create a specially-crafted XML file that forges an XML\nsignature, allowing the attacker to bypass authentication that is based on\nthe XML Signature specification. (CVE-2009-0217)\n\nSwatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss\nApplication Server Web Console. An attacker could use these flaws to\npresent misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-2405)\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nAn information leak flaw was found in the twiddle command line client. The\nJMX password was logged in plain text to \"twiddle.log\". (CVE-2009-3554)\n\nAn XSS flaw was found in the JMX Console. An attacker could use this flaw\nto present misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-1380)\n\nWarning: Before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1650",
"url": "https://access.redhat.com/errata/RHSA-2009:1650"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/"
},
{
"category": "external",
"summary": "510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "532111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532111"
},
{
"category": "external",
"summary": "539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1650.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP08 update",
"tracking": {
"current_release_date": "2026-03-13T01:03:39+00:00",
"generator": {
"date": "2026-03-13T01:03:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2009:1650",
"initial_release_date": "2009-12-10T00:03:00+00:00",
"revision_history": [
{
"date": "2009-12-10T00:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-12-09T19:03:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el5.src",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el5.src",
"product_id": "jgroups-1:2.4.7-1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"product_id": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11GA_CP02.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"product_id": "jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.14.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"product": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"product_id": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-6.GA_CP08.ep1.3.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"product": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"product_id": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-5.GA_CP08.5.2.ep1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"product_id": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.3.1-1.11GA_CP02.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_id": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11GA_CP02.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.3.2-2.5.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.14.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"product_id": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.14.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-6.GA_CP08.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-6.GA_CP08.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product": {
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product_id": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-4.2.0.GA_CP08-bin@4.2.0-5.GA_CP08.5.2.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product_id": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-5.GA_CP08.5.2.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product": {
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product_id": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-client@4.2.0-5.GA_CP08.5.2.ep1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.14.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch"
},
"product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src"
},
"product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch"
},
"product_reference": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch"
},
"product_reference": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-10T00:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1650"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-1380",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511224"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jbossas JMX-Console cross-site-scripting in filter parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1380"
},
{
"category": "external",
"summary": "RHBZ#511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1380"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380"
}
],
"release_date": "2009-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-10T00:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1650"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "jbossas JMX-Console cross-site-scripting in filter parameter"
},
{
"cve": "CVE-2009-2405",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510023"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss Application Server Web Console XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect Red Hat JBoss Enterprise Application Platform 5 or 6. Older versions of the community JBoss Application Server 5.x may be affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2405"
},
{
"category": "external",
"summary": "RHBZ#510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2405"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405"
}
],
"release_date": "2009-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-10T00:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1650"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss Application Server Web Console XSS"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-10T00:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1650"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-3554",
"discovery_date": "2009-10-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "539495"
}
],
"notes": [
{
"category": "description",
"text": "Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss EAP Twiddle logs the JMX password",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3554"
},
{
"category": "external",
"summary": "RHBZ#539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554"
}
],
"release_date": "2009-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-10T00:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1650"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss EAP Twiddle logs the JMX password"
}
]
}
RHSA-2009_1636
Vulnerability from csaf_redhat - Published: 2009-12-09 23:14 - Updated: 2024-12-15 18:16The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.
Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nmultiple security issues, several bugs, and add enhancements are now\navailable for Red Hat Enterprise Linux 4 as JBEAP 4.3.0.CP07.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.3.0.CP06.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the Release Notes, available shortly from:\nhttp://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/\n\nThe following security issues are also fixed with this release:\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xml-security. An attacker could use\nthis flaw to create a specially-crafted XML file that forges an XML\nsignature, allowing the attacker to bypass authentication that is based on\nthe XML Signature specification. (CVE-2009-0217)\n\nSwatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss\nApplication Server Web Console. An attacker could use these flaws to\npresent misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-2405)\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nAn information leak flaw was found in the twiddle command line client. The\nJMX password was logged in plain text to \"twiddle.log\". (CVE-2009-3554)\n\nAn XSS flaw was found in the JMX Console. An attacker could use this flaw\nto present misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-1380)\n\nWarning: Before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1636",
"url": "https://access.redhat.com/errata/RHSA-2009:1636"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/"
},
{
"category": "external",
"summary": "510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "532117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532117"
},
{
"category": "external",
"summary": "539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1636.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update",
"tracking": {
"current_release_date": "2024-12-15T18:16:17+00:00",
"generator": {
"date": "2024-12-15T18:16:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2009:1636",
"initial_release_date": "2009-12-09T23:14:00+00:00",
"revision_history": [
{
"date": "2009-12-09T23:14:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-12-09T18:14:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-15T18:16:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"product_id": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1.12.patch03.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"product": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"product_id": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-2.GA_CP05.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"product": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"product_id": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-1.GA_CP05.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"product": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"product_id": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-9jpp.4.patch_02.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el4.src",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el4.src",
"product_id": "jgroups-1:2.4.7-1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"product_id": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11.GA_CP02.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.GA_CP01.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"product": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"product_id": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-3.SP3_CP09.4.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"product": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"product_id": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-9.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"product": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"product_id": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-4.SP2_CP07.2.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"product": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"product_id": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-6.GA_CP07.4.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"product": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"product_id": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2@2.0.2.FP-1.ep1.21.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"product": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"product_id": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-6.GA_CP07.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"product": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"product_id": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0jpp.ep1.5.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"product_id": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1.12.patch03.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"product": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"product_id": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-javadoc@2.1.4-1.12.patch03.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"product": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"product_id": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-2.GA_CP05.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"product": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"product_id": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-1.GA_CP05.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"product": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"product_id": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-9jpp.4.patch_02.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"product_id": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_id": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11.GA_CP02.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.3.1-1.11.GA_CP02.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.GA_CP01.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.3.2-2.5.GA_CP01.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"product": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"product_id": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-3.SP3_CP09.4.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"product": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"product_id": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-9.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"product": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"product_id": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-4.SP2_CP07.2.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"product": {
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"product_id": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-native42@2.0.1-4.SP2_CP07.2.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product_id": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-6.GA_CP07.4.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product": {
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product_id": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-client@4.3.0-6.GA_CP07.4.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product": {
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product_id": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-4.3.0.GA_CP07-bin@4.3.0-6.GA_CP07.4.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"product": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"product_id": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2@2.0.2.FP-1.ep1.21.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"product": {
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"product_id": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2-docs@2.0.2.FP-1.ep1.21.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"product_id": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.3.0-6.GA_CP07.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"product": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"product_id": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-6.GA_CP07.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"product_id": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0jpp.ep1.5.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch"
},
"product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src"
},
"product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch"
},
"product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src"
},
"product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch"
},
"product_reference": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch"
},
"product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src"
},
"product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch"
},
"product_reference": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch"
},
"product_reference": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch"
},
"product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src"
},
"product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src"
},
"product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src"
},
"product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch"
},
"product_reference": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src"
},
"product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch"
},
"product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src"
},
"product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch"
},
"product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src"
},
"product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch"
},
"product_reference": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch"
},
"product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src"
},
"product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch"
},
"product_reference": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch"
},
"product_reference": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch"
},
"product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src"
},
"product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src"
},
"product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src"
},
"product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch"
},
"product_reference": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src"
},
"product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP-4.3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1636"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-1380",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511224"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jbossas JMX-Console cross-site-scripting in filter parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1380"
},
{
"category": "external",
"summary": "RHBZ#511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1380"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380"
}
],
"release_date": "2009-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1636"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "jbossas JMX-Console cross-site-scripting in filter parameter"
},
{
"cve": "CVE-2009-2405",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510023"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss Application Server Web Console XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect Red Hat JBoss Enterprise Application Platform 5 or 6. Older versions of the community JBoss Application Server 5.x may be affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2405"
},
{
"category": "external",
"summary": "RHBZ#510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2405"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405"
}
],
"release_date": "2009-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1636"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss Application Server Web Console XSS"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1636"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-3554",
"discovery_date": "2009-10-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "539495"
}
],
"notes": [
{
"category": "description",
"text": "Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss EAP Twiddle logs the JMX password",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3554"
},
{
"category": "external",
"summary": "RHBZ#539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554"
}
],
"release_date": "2009-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1636"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src",
"4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src",
"4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src",
"4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss EAP Twiddle logs the JMX password"
}
]
}
RHSA-2009:1649
Vulnerability from csaf_redhat - Published: 2009-12-09 23:51 - Updated: 2026-03-13 01:03The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.
Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.
Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.
Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nmultiple security issues, several bugs, and add enhancements are now\navailable for Red Hat Enterprise Linux 5 as JBEAP 4.3.0.CP07.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.3.0.CP06.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the Release Notes, available shortly from:\nhttp://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/\n\nThe following security issues are also fixed with this release:\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xml-security. An attacker could use\nthis flaw to create a specially-crafted XML file that forges an XML\nsignature, allowing the attacker to bypass authentication that is based on\nthe XML Signature specification. (CVE-2009-0217)\n\nSwatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss\nApplication Server Web Console. An attacker could use these flaws to\npresent misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-2405)\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nAn information leak flaw was found in the twiddle command line client. The\nJMX password was logged in plain text to \"twiddle.log\". (CVE-2009-3554)\n\nAn XSS flaw was found in the JMX Console. An attacker could use this flaw\nto present misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-1380)\n\nWarning: Before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1649",
"url": "https://access.redhat.com/errata/RHSA-2009:1649"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/"
},
{
"category": "external",
"summary": "510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "532113",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532113"
},
{
"category": "external",
"summary": "539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1649.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update",
"tracking": {
"current_release_date": "2026-03-13T01:03:39+00:00",
"generator": {
"date": "2026-03-13T01:03:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2009:1649",
"initial_release_date": "2009-12-09T23:51:00+00:00",
"revision_history": [
{
"date": "2009-12-09T23:51:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-12-09T18:51:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-13T01:03:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el5.src",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el5.src",
"product_id": "jgroups-1:2.4.7-1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"product_id": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11GA_CP02.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"product": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"product_id": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-3.SP3_CP09.4.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"product_id": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1.12.patch03.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"product": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"product_id": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-2.GA_CP05.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"product": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"product_id": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-1.GA_CP05.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"product": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"product_id": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-4.SP2_CP07.2.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"product": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"product_id": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-6.GA_CP07.ep1.3.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"product": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"product_id": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2@2.0.2.FP-1.ep1.18.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"product": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"product_id": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-6.GA_CP07.4.2.ep1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"product_id": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.3.1-1.11GA_CP02.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_id": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11GA_CP02.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"product": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"product_id": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-3.SP3_CP09.4.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"product": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"product_id": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-javadoc@2.1.4-1.12.patch03.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"product": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"product_id": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1.12.patch03.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"product": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"product_id": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-common@1.0.0-2.GA_CP05.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"product": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"product_id": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-1.GA_CP05.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"product": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"product_id": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws@2.0.1-4.SP2_CP07.2.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"product": {
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"product_id": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossws-native42@2.0.1-4.SP2_CP07.2.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.3.2-2.5.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.3.0-6.GA_CP07.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-6.GA_CP07.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"product": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"product_id": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2@2.0.2.FP-1.ep1.18.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"product": {
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"product_id": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam2-docs@2.0.2.FP-1.ep1.18.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product": {
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product_id": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-client@4.3.0-6.GA_CP07.4.2.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product_id": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.3.0-6.GA_CP07.4.2.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product": {
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product_id": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-4.3.0.GA_CP07-bin@4.3.0-6.GA_CP07.4.2.ep1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src"
},
"product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch"
},
"product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch"
},
"product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src"
},
"product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src"
},
"product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch"
},
"product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src"
},
"product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch"
},
"product_reference": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch"
},
"product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src"
},
"product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch"
},
"product_reference": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch"
},
"product_reference": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch"
},
"product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src"
},
"product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch"
},
"product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src"
},
"product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch"
},
"product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src"
},
"product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch"
},
"product_reference": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src"
},
"product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1649"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-1380",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511224"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jbossas JMX-Console cross-site-scripting in filter parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1380"
},
{
"category": "external",
"summary": "RHBZ#511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1380"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380"
}
],
"release_date": "2009-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1649"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "jbossas JMX-Console cross-site-scripting in filter parameter"
},
{
"cve": "CVE-2009-2405",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510023"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss Application Server Web Console XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect Red Hat JBoss Enterprise Application Platform 5 or 6. Older versions of the community JBoss Application Server 5.x may be affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2405"
},
{
"category": "external",
"summary": "RHBZ#510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2405"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405"
}
],
"release_date": "2009-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1649"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss Application Server Web Console XSS"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "Previously, a denial-of-service flaw was found in Java which allowed the creation of an inifinte loop in XML headers that would consume all CPU resources. This issue was patched and Java is no longer vulnerable to a denial-of-service flaw due to the initiation of an infinte loop by means of XML headers.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1649"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-3554",
"discovery_date": "2009-10-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "539495"
}
],
"notes": [
{
"category": "description",
"text": "Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss EAP Twiddle logs the JMX password",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3554"
},
{
"category": "external",
"summary": "RHBZ#539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554"
}
],
"release_date": "2009-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:51:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1649"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src",
"5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src",
"5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src",
"5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss EAP Twiddle logs the JMX password"
}
]
}
RHSA-2009_1200
Vulnerability from csaf_redhat - Published: 2009-08-06 20:41 - Updated: 2024-11-14 10:46The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.
The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.
The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in "old zip and certificate handling" and have unspecified other impact via unknown vectors.
The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet.
The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP).
Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-sun packages that correct several security issues are\nnow available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and\nthe Sun Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 6 Runtime\nEnvironment and the Sun Java 6 Software Development Kit. These\nvulnerabilities are summarized on the \"Advance notification of Security\nUpdates for Java SE\" page from Sun Microsystems, listed in the References\nsection. (CVE-2009-0217, CVE-2009-2475, CVE-2009-2476, CVE-2009-2625,\nCVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2674,\nCVE-2009-2675, CVE-2009-2676, CVE-2009-2690)\n\nUsers of java-1.6.0-sun should upgrade to these updated packages, which\ncorrect these issues. All running instances of Sun Java must be restarted\nfor the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1200",
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5",
"url": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5"
},
{
"category": "external",
"summary": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "external",
"summary": "515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1200.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-sun security update",
"tracking": {
"current_release_date": "2024-11-14T10:46:51+00:00",
"generator": {
"date": "2024-11-14T10:46:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2009:1200",
"initial_release_date": "2009-08-06T20:41:00+00:00",
"revision_history": [
{
"date": "2009-08-06T20:41:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-06T16:41:36+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:46:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 4 Extras",
"product": {
"name": "Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product": {
"name": "Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product": {
"name": "Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_extras:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux Supplementary"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"product": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i586"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras",
"product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4AS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras",
"product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4Desktop-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras",
"product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4ES-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras",
"product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"relates_to_product_reference": "4WS-LACD"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)",
"product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Client-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"relates_to_product_reference": "5Server-Supplementary"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)",
"product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
},
"product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"relates_to_product_reference": "5Server-Supplementary"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-2475",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2475"
},
{
"category": "external",
"summary": "RHBZ#513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)"
},
{
"cve": "CVE-2009-2476",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513220"
}
],
"notes": [
{
"category": "description",
"text": "The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK OpenType checks can be bypassed (6736293)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2476"
},
{
"category": "external",
"summary": "RHBZ#513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK OpenType checks can be bypassed (6736293)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2676",
"discovery_date": "2009-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515890"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JRE applet launcher vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2676"
},
{
"category": "external",
"summary": "RHBZ#515890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2676"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "JRE applet launcher vulnerability"
},
{
"cve": "CVE-2009-2690",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513223"
}
],
"notes": [
{
"category": "description",
"text": "The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK private variable information disclosure (6777487)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2690"
},
{
"category": "external",
"summary": "RHBZ#513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2690"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK private variable information disclosure (6777487)"
},
{
"cve": "CVE-2009-2716",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516812"
}
],
"notes": [
{
"category": "description",
"text": "The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in \"old zip and certificate handling\" and have unspecified other impact via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK improper version selection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2716"
},
{
"category": "external",
"summary": "RHBZ#516812",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516812"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2716"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2716",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2716"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK improper version selection"
},
{
"cve": "CVE-2009-2718",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516815"
}
],
"notes": [
{
"category": "description",
"text": "The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK reposition of untrusted applet security icon in X11",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2718"
},
{
"category": "external",
"summary": "RHBZ#516815",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516815"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2718",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2718"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK reposition of untrusted applet security icon in X11"
},
{
"cve": "CVE-2009-2719",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516820"
}
],
"notes": [
{
"category": "description",
"text": "The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK DoS with crafted .jnlp file",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2719"
},
{
"category": "external",
"summary": "RHBZ#516820",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516820"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2719"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2719",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2719"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK DoS with crafted .jnlp file"
},
{
"cve": "CVE-2009-2720",
"discovery_date": "2009-08-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "516823"
}
],
"notes": [
{
"category": "description",
"text": "Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK DoS with Swing Synthcontext implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2720"
},
{
"category": "external",
"summary": "RHBZ#516823",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=516823"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720"
}
],
"release_date": "2009-08-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T20:41:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1200"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586",
"4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586",
"5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "JDK DoS with Swing Synthcontext implementation"
}
]
}
RHSA-2009_1650
Vulnerability from csaf_redhat - Published: 2009-12-10 00:03 - Updated: 2024-12-15 18:16The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.
Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nmultiple security issues, several bugs, and add enhancements are now\navailable for Red Hat Enterprise Linux 5 as JBEAP 4.2.0.CP08.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.2.0.CP07.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the Release Notes, available shortly from:\nhttp://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/\n\nThe following security issues are also fixed with this release:\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xml-security. An attacker could use\nthis flaw to create a specially-crafted XML file that forges an XML\nsignature, allowing the attacker to bypass authentication that is based on\nthe XML Signature specification. (CVE-2009-0217)\n\nSwatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss\nApplication Server Web Console. An attacker could use these flaws to\npresent misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-2405)\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nAn information leak flaw was found in the twiddle command line client. The\nJMX password was logged in plain text to \"twiddle.log\". (CVE-2009-3554)\n\nAn XSS flaw was found in the JMX Console. An attacker could use this flaw\nto present misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-1380)\n\nWarning: Before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1650",
"url": "https://access.redhat.com/errata/RHSA-2009:1650"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/"
},
{
"category": "external",
"summary": "510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "532111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532111"
},
{
"category": "external",
"summary": "539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1650.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP08 update",
"tracking": {
"current_release_date": "2024-12-15T18:16:32+00:00",
"generator": {
"date": "2024-12-15T18:16:32+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2009:1650",
"initial_release_date": "2009-12-10T00:03:00+00:00",
"revision_history": [
{
"date": "2009-12-10T00:03:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-12-09T19:03:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-15T18:16:32+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el5.src",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el5.src",
"product_id": "jgroups-1:2.4.7-1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"product_id": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11GA_CP02.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el5?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"product_id": "jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.14.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"product": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"product_id": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-6.GA_CP08.ep1.3.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.1.el5?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"product": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"product_id": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-5.GA_CP08.5.2.ep1.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"product_id": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.3.1-1.11GA_CP02.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_id": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11GA_CP02.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el5?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.3.2-2.5.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.14.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"product_id": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.14.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-6.GA_CP08.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"product_id": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-6.GA_CP08.ep1.3.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el5.1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product": {
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product_id": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-4.2.0.GA_CP08-bin@4.2.0-5.GA_CP08.5.2.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product_id": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-5.GA_CP08.5.2.ep1.el5?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product": {
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product_id": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-client@4.2.0-5.GA_CP08.5.2.ep1.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.14.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch"
},
"product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src"
},
"product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch"
},
"product_reference": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch"
},
"product_reference": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server",
"product_id": "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src",
"relates_to_product_reference": "5Server-JBEAP-4.2.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-10T00:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1650"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-1380",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511224"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jbossas JMX-Console cross-site-scripting in filter parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1380"
},
{
"category": "external",
"summary": "RHBZ#511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1380"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380"
}
],
"release_date": "2009-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-10T00:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1650"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "jbossas JMX-Console cross-site-scripting in filter parameter"
},
{
"cve": "CVE-2009-2405",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510023"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss Application Server Web Console XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect Red Hat JBoss Enterprise Application Platform 5 or 6. Older versions of the community JBoss Application Server 5.x may be affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2405"
},
{
"category": "external",
"summary": "RHBZ#510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2405"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405"
}
],
"release_date": "2009-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-10T00:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1650"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss Application Server Web Console XSS"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-10T00:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1650"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-3554",
"discovery_date": "2009-10-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "539495"
}
],
"notes": [
{
"category": "description",
"text": "Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss EAP Twiddle logs the JMX password",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3554"
},
{
"category": "external",
"summary": "RHBZ#539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554"
}
],
"release_date": "2009-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-10T00:03:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1650"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch",
"5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch",
"5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src",
"5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src",
"5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch",
"5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch",
"5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch",
"5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch",
"5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src",
"5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch",
"5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss EAP Twiddle logs the JMX password"
}
]
}
RHSA-2009_1637
Vulnerability from csaf_redhat - Published: 2009-12-09 23:32 - Updated: 2024-12-15 18:16The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.
Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nmultiple security issues, several bugs, and add enhancements are now\navailable for Red Hat Enterprise Linux 4 as JBEAP 4.2.0.CP08.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.2.0.CP07.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the Release Notes, available shortly from:\nhttp://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/\n\nThe following security issues are also fixed with this release:\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xml-security. An attacker could use\nthis flaw to create a specially-crafted XML file that forges an XML\nsignature, allowing the attacker to bypass authentication that is based on\nthe XML Signature specification. (CVE-2009-0217)\n\nSwatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss\nApplication Server Web Console. An attacker could use these flaws to\npresent misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-2405)\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nAn information leak flaw was found in the twiddle command line client. The\nJMX password was logged in plain text to \"twiddle.log\". (CVE-2009-3554)\n\nAn XSS flaw was found in the JMX Console. An attacker could use this flaw\nto present misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-1380)\n\nWarning: Before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1637",
"url": "https://access.redhat.com/errata/RHSA-2009:1637"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/",
"url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/"
},
{
"category": "external",
"summary": "510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "532116",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=532116"
},
{
"category": "external",
"summary": "539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1637.json"
}
],
"title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP08 update",
"tracking": {
"current_release_date": "2024-12-15T18:16:23+00:00",
"generator": {
"date": "2024-12-15T18:16:23+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2009:1637",
"initial_release_date": "2009-12-09T23:32:00+00:00",
"revision_history": [
{
"date": "2009-12-09T23:32:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-12-09T18:32:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-15T18:16:23+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"product": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"product_id": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-9jpp.4.patch_02.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el4.src",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el4.src",
"product_id": "jgroups-1:2.4.7-1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"product_id": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11.GA_CP02.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.GA_CP01.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"product": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"product_id": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-9.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el4?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"product": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"product_id": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-5.GA_CP08.5.ep1.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"product_id": "jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.22.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"product": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"product_id": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-6.GA_CP08.ep1.3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"product": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"product_id": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0jpp.ep1.5.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"product": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"product": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"product": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"product": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"product": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"product_id": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-9jpp.4.patch_02.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"product": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"product_id": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"product": {
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"product_id": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_id": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11.GA_CP02.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_id": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.3.1-1.11.GA_CP02.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_id": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.GA_CP01.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_id": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.3.2-2.5.GA_CP01.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"product": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"product": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"product": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"product": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"product_id": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-9.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"product": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"product_id": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"product": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"product": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product_id": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas@4.2.0-5.GA_CP08.5.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product": {
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product_id": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-client@4.2.0-5.GA_CP08.5.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product": {
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product_id": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jbossas-4.2.0.GA_CP08-bin@4.2.0-5.GA_CP08.5.ep1.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"product": {
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"product_id": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.22.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"product": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"product_id": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.22.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"product": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"product_id": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-6.GA_CP08.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"product": {
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"product_id": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-6.GA_CP08.ep1.3.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"product": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"product_id": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0jpp.ep1.5.el4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch"
},
"product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src"
},
"product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch"
},
"product_reference": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch"
},
"product_reference": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS",
"product_id": "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"relates_to_product_reference": "4AS-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src"
},
"product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src"
},
"product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src"
},
"product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src"
},
"product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch"
},
"product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src"
},
"product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch"
},
"product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch"
},
"product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src"
},
"product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src"
},
"product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src"
},
"product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src"
},
"product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src"
},
"product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-0:1.2.1-1.ep1.22.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src"
},
"product_reference": "jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch"
},
"product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch"
},
"product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src"
},
"product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch"
},
"product_reference": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch"
},
"product_reference": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src"
},
"product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src"
},
"product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jcommon-0:1.0.16-1.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src"
},
"product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src"
},
"product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jgroups-1:2.4.7-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src"
},
"product_reference": "jgroups-1:2.4.7-1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src"
},
"product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src"
},
"product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch"
},
"product_reference": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src"
},
"product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"relates_to_product_reference": "4ES-JBEAP"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES",
"product_id": "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
},
"product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"relates_to_product_reference": "4ES-JBEAP"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1637"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-1380",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-05-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511224"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jbossas JMX-Console cross-site-scripting in filter parameter",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1380"
},
{
"category": "external",
"summary": "RHBZ#511224",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1380"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380"
}
],
"release_date": "2009-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1637"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "jbossas JMX-Console cross-site-scripting in filter parameter"
},
{
"cve": "CVE-2009-2405",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2009-07-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "510023"
}
],
"notes": [
{
"category": "description",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss Application Server Web Console XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect Red Hat JBoss Enterprise Application Platform 5 or 6. Older versions of the community JBoss Application Server 5.x may be affected.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2405"
},
{
"category": "external",
"summary": "RHBZ#510023",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2405",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2405"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405"
}
],
"release_date": "2009-07-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1637"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss Application Server Web Console XSS"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1637"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-3554",
"discovery_date": "2009-10-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "539495"
}
],
"notes": [
{
"category": "description",
"text": "Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JBoss EAP Twiddle logs the JMX password",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3554"
},
{
"category": "external",
"summary": "RHBZ#539495",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3554",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3554"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554"
}
],
"release_date": "2009-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-12-09T23:32:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1637"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch",
"4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch",
"4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src",
"4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src",
"4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch",
"4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch",
"4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch",
"4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch",
"4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch",
"4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch",
"4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src",
"4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src",
"4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch",
"4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch",
"4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch",
"4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch",
"4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch",
"4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch",
"4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src",
"4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch",
"4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch",
"4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JBoss EAP Twiddle logs the JMX password"
}
]
}
RHSA-2009_1201
Vulnerability from csaf_redhat - Published: 2009-08-06 21:14 - Updated: 2024-11-14 10:47The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.
The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.
The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.
The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.
Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.
Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.
JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.
The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated java-1.6.0-openjdk packages that fix several security issues and a\nbug are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit. The Java Runtime Environment (JRE)\ncontains the software and tools that users need to run applications written\nusing the Java programming language.\n\nA flaw was found in the way the XML Digital Signature implementation in the\nJRE handled HMAC-based XML signatures. An attacker could use this flaw to\ncreate a crafted signature that could allow them to bypass authentication,\nor trick a user, applet, or application into accepting untrusted content.\n(CVE-2009-0217)\n\nSeveral potential information leaks were found in various mutable static\nvariables. These could be exploited in application scenarios that execute\nuntrusted scripting code. (CVE-2009-2475)\n\nIt was discovered that OpenType checks can be bypassed. This could allow a\nrogue application to bypass access restrictions by acquiring references to\nprivileged objects through finalizer resurrection. (CVE-2009-2476)\n\nA denial of service flaw was found in the way the JRE processes XML. A\nremote attacker could use this flaw to supply crafted XML that would lead\nto a denial of service. (CVE-2009-2625)\n\nA flaw was found in the JRE audio system. An untrusted applet or\napplication could use this flaw to gain read access to restricted System\nproperties. (CVE-2009-2670)\n\nTwo flaws were found in the JRE proxy implementation. An untrusted applet\nor application could use these flaws to discover the usernames of users\nrunning applets and applications, or obtain web browser cookies and use\nthem for session hijacking attacks. (CVE-2009-2671, CVE-2009-2672)\n\nAn additional flaw was found in the proxy mechanism implementation. This\nflaw allowed an untrusted applet or application to bypass access\nrestrictions and communicate using non-authorized socket or URL connections\nto hosts other than the origin host. (CVE-2009-2673) \n\nAn integer overflow flaw was found in the way the JRE processes JPEG\nimages. An untrusted application could use this flaw to extend its\nprivileges, allowing it to read and write local files, as well as to\nexecute local applications with the privileges of the user running the\napplication. (CVE-2009-2674)\n\nAn integer overflow flaw was found in the JRE unpack200 functionality. An\nuntrusted applet or application could extend its privileges, allowing it to\nread and write local files, as well as to execute local applications with\nthe privileges of the user running the applet or application. (CVE-2009-2675)\n\nIt was discovered that JDK13Services grants unnecessary privileges to\ncertain object types. This could be misused by an untrusted applet or\napplication to use otherwise restricted functionality. (CVE-2009-2689)\n\nAn information disclosure flaw was found in the way private Java variables\nwere handled. An untrusted applet or application could use this flaw to\nobtain information from variables that would otherwise be private.\n(CVE-2009-2690)\n\nNote: The flaws concerning applets in this advisory, CVE-2009-2475,\nCVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675,\nCVE-2009-2689, and CVE-2009-2690, can only be triggered in\njava-1.6.0-openjdk by calling the \"appletviewer\" application.\n\nThis update also fixes the following bug:\n\n* the EVR in the java-1.6.0-openjdk package as shipped with Red Hat\nEnterprise Linux allowed the java-1.6.0-openjdk package from the EPEL\nrepository to take precedence (appear newer). Users using\njava-1.6.0-openjdk from EPEL would not have received security updates since\nOctober 2008. This update prevents the packages from EPEL from taking\nprecedence. (BZ#499079)\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1201",
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5",
"url": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5"
},
{
"category": "external",
"summary": "499079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=499079"
},
{
"category": "external",
"summary": "511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1201.json"
}
],
"title": "Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update",
"tracking": {
"current_release_date": "2024-11-14T10:47:06+00:00",
"generator": {
"date": "2024-11-14T10:47:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.0"
}
},
"id": "RHSA-2009:1201",
"initial_release_date": "2009-08-06T21:14:00+00:00",
"revision_history": [
{
"date": "2009-08-06T21:14:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-06T17:14:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-14T10:47:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"product": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=src\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
},
"product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"discovery_date": "2009-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "511915"
}
],
"notes": [
{
"category": "description",
"text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0217"
},
{
"category": "external",
"summary": "RHBZ#511915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
}
],
"release_date": "2009-07-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass"
},
{
"cve": "CVE-2009-2475",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513215"
}
],
"notes": [
{
"category": "description",
"text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2475"
},
{
"category": "external",
"summary": "RHBZ#513215",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)"
},
{
"cve": "CVE-2009-2476",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513220"
}
],
"notes": [
{
"category": "description",
"text": "The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK OpenType checks can be bypassed (6736293)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2476"
},
{
"category": "external",
"summary": "RHBZ#513220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2476"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK OpenType checks can be bypassed (6736293)"
},
{
"cve": "CVE-2009-2625",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512921"
}
],
"notes": [
{
"category": "description",
"text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "JDK: XML parsing Denial-Of-Service (6845701)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2625"
},
{
"category": "external",
"summary": "RHBZ#512921",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2625"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "JDK: XML parsing Denial-Of-Service (6845701)"
},
{
"cve": "CVE-2009-2670",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512896"
}
],
"notes": [
{
"category": "description",
"text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Untrusted applet System properties access (6738524)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2670"
},
{
"category": "external",
"summary": "RHBZ#512896",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2670"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "OpenJDK Untrusted applet System properties access (6738524)"
},
{
"cve": "CVE-2009-2671",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2671"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2671"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2672",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512907"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK Proxy mechanism information leaks (6801071)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2672"
},
{
"category": "external",
"summary": "RHBZ#512907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2672"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK Proxy mechanism information leaks (6801071)"
},
{
"cve": "CVE-2009-2673",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512914"
}
],
"notes": [
{
"category": "description",
"text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2673"
},
{
"category": "external",
"summary": "RHBZ#512914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2673"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)"
},
{
"cve": "CVE-2009-2674",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512915"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer JPEG processing integer overflow (6823373)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2674"
},
{
"category": "external",
"summary": "RHBZ#512915",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2674"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer JPEG processing integer overflow (6823373)"
},
{
"cve": "CVE-2009-2675",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "512920"
}
],
"notes": [
{
"category": "description",
"text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2675"
},
{
"category": "external",
"summary": "RHBZ#512920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2675"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)"
},
{
"cve": "CVE-2009-2689",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513222"
}
],
"notes": [
{
"category": "description",
"text": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK JDK13Services grants unnecessary privileges (6777448)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2689"
},
{
"category": "external",
"summary": "RHBZ#513222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2689"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK JDK13Services grants unnecessary privileges (6777448)"
},
{
"cve": "CVE-2009-2690",
"discovery_date": "2009-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "513223"
}
],
"notes": [
{
"category": "description",
"text": "The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "OpenJDK private variable information disclosure (6777487)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2690"
},
{
"category": "external",
"summary": "RHBZ#513223",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2690",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2690"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690"
}
],
"release_date": "2009-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-06T21:14:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1201"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src",
"5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386",
"5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "OpenJDK private variable information disclosure (6777487)"
}
]
}
GHSA-8HFM-837H-HJG5
Vulnerability from github – Published: 2022-05-02 03:13 – Updated: 2022-11-08 14:55The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in multiple products.
The Apache XML Security (Java) is affected by the vulnerability published in US-Cert VU #466161. See: http://www.kb.cert.org/vuls/id/466161 for more information. This bug can allow an attacker to bypass authentication by inserting/modifying a small HMAC truncation length parameter in the XML Signature HMAC based SignatureMethod algorithms.
An inexhaustive list of additional affected products includes:
1. the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM;
2. the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6;
3. Mono before 2.4.2.2;
4. XML Security Library before 1.2.12;
5. IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1;
6. Sun JDK and JRE Update 14 and earlier;
7. Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.santuario:xmlsec"
},
"ranges": [
{
"events": [
{
"introduced": "1.4.0"
},
{
"fixed": "1.4.3"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2009-0217"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": true,
"github_reviewed_at": "2022-11-08T14:55:27Z",
"nvd_published_at": "2009-07-14T23:30:00Z",
"severity": "MODERATE"
},
"details": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in multiple products.\n\nThe Apache XML Security (Java) is affected by the vulnerability published in US-Cert VU #466161. See: http://www.kb.cert.org/vuls/id/466161 for more information. This bug can allow an attacker to bypass authentication by inserting/modifying a small HMAC truncation length parameter in the XML Signature HMAC based SignatureMethod algorithms.\n\nAn inexhaustive list of additional affected products includes: \n1. the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; \n2. the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; \n3. Mono before 2.4.2.2; \n4. XML Security Library before 1.2.12; \n5. IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; \n6. Sun JDK and JRE Update 14 and earlier; \n7. Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"id": "GHSA-8hfm-837h-hjg5",
"modified": "2022-11-08T14:55:27Z",
"published": "2022-05-02T03:13:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217"
},
{
"type": "WEB",
"url": "https://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html"
},
{
"type": "WEB",
"url": "https://www.w3.org/2008/06/xmldsigcore-errata.html#e03"
},
{
"type": "WEB",
"url": "https://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"type": "WEB",
"url": "https://www.ubuntu.com/usn/USN-903-1"
},
{
"type": "WEB",
"url": "https://www.redhat.com/support/errata/RHSA-2009-1694.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"
},
{
"type": "WEB",
"url": "https://www.mandriva.com/security/advisories?name=MDVSA-2009:209"
},
{
"type": "WEB",
"url": "https://www.kb.cert.org/vuls/id/WDON-7TY529"
},
{
"type": "WEB",
"url": "https://www.kb.cert.org/vuls/id/MAPG-7TSKXQ"
},
{
"type": "WEB",
"url": "https://www.kb.cert.org/vuls/id/466161"
},
{
"type": "WEB",
"url": "https://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2010/dsa-1995"
},
{
"type": "WEB",
"url": "https://svn.apache.org/viewvc?revision=794013\u0026view=revision"
},
{
"type": "WEB",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1428.html"
},
{
"type": "WEB",
"url": "https://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"type": "WEB",
"url": "https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html"
},
{
"type": "WEB",
"url": "https://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"type": "WEB",
"url": "https://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"type": "WEB",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527"
},
{
"type": "WEB",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526"
},
{
"type": "WEB",
"url": "https://gitlab.gnome.org/Archive/xmlsec/-/commit/34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"type": "WEB",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-159B.html"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Apache XML Security For Java vulnerable to authentication bypass by HMAC truncation"
}
FKIE_CVE-2009-0217
Vulnerability from fkie_nvd - Published: 2009-07-14 23:30 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| cret@cert.org | http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161 | ||
| cret@cert.org | http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7 | ||
| cret@cert.org | http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7 | ||
| cret@cert.org | http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html | ||
| cret@cert.org | http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html | ||
| cret@cert.org | http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html | ||
| cret@cert.org | http://marc.info/?l=bugtraq&m=125787273209737&w=2 | ||
| cret@cert.org | http://osvdb.org/55895 | ||
| cret@cert.org | http://osvdb.org/55907 | ||
| cret@cert.org | http://secunia.com/advisories/34461 | ||
| cret@cert.org | http://secunia.com/advisories/35776 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/35852 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/35853 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/35854 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/35855 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/35858 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/36162 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/36176 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/36180 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/36494 | Vendor Advisory | |
| cret@cert.org | http://secunia.com/advisories/37300 | ||
| cret@cert.org | http://secunia.com/advisories/37671 | ||
| cret@cert.org | http://secunia.com/advisories/37841 | ||
| cret@cert.org | http://secunia.com/advisories/38567 | ||
| cret@cert.org | http://secunia.com/advisories/38568 | ||
| cret@cert.org | http://secunia.com/advisories/38695 | ||
| cret@cert.org | http://secunia.com/advisories/38921 | ||
| cret@cert.org | http://secunia.com/advisories/41818 | ||
| cret@cert.org | http://secunia.com/advisories/60799 | ||
| cret@cert.org | http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1 | ||
| cret@cert.org | http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1 | ||
| cret@cert.org | http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1 | ||
| cret@cert.org | http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1 | ||
| cret@cert.org | http://svn.apache.org/viewvc?revision=794013&view=revision | ||
| cret@cert.org | http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023545&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere | Patch, Vendor Advisory | |
| cret@cert.org | http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023723&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere | Patch, Vendor Advisory | |
| cret@cert.org | http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384925 | Patch, Vendor Advisory | |
| cret@cert.org | http://www.aleksey.com/xmlsec/ | ||
| cret@cert.org | http://www.debian.org/security/2010/dsa-1995 | ||
| cret@cert.org | http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml | ||
| cret@cert.org | http://www.kb.cert.org/vuls/id/466161 | US Government Resource | |
| cret@cert.org | http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ | ||
| cret@cert.org | http://www.kb.cert.org/vuls/id/WDON-7TY529 | ||
| cret@cert.org | http://www.mandriva.com/security/advisories?name=MDVSA-2009:209 | ||
| cret@cert.org | http://www.mono-project.com/Vulnerabilities | Vendor Advisory | |
| cret@cert.org | http://www.openoffice.org/security/cves/CVE-2009-0217.html | ||
| cret@cert.org | http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html | ||
| cret@cert.org | http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html | ||
| cret@cert.org | http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html | ||
| cret@cert.org | http://www.redhat.com/support/errata/RHSA-2009-1694.html | ||
| cret@cert.org | http://www.securityfocus.com/bid/35671 | Patch | |
| cret@cert.org | http://www.securitytracker.com/id?1022561 | ||
| cret@cert.org | http://www.securitytracker.com/id?1022567 | ||
| cret@cert.org | http://www.securitytracker.com/id?1022661 | ||
| cret@cert.org | http://www.ubuntu.com/usn/USN-903-1 | ||
| cret@cert.org | http://www.us-cert.gov/cas/techalerts/TA09-294A.html | US Government Resource | |
| cret@cert.org | http://www.us-cert.gov/cas/techalerts/TA10-159B.html | US Government Resource | |
| cret@cert.org | http://www.vupen.com/english/advisories/2009/1900 | Patch, Vendor Advisory | |
| cret@cert.org | http://www.vupen.com/english/advisories/2009/1908 | Patch, Vendor Advisory | |
| cret@cert.org | http://www.vupen.com/english/advisories/2009/1909 | Patch, Vendor Advisory | |
| cret@cert.org | http://www.vupen.com/english/advisories/2009/1911 | Patch, Vendor Advisory | |
| cret@cert.org | http://www.vupen.com/english/advisories/2009/2543 | ||
| cret@cert.org | http://www.vupen.com/english/advisories/2009/3122 | ||
| cret@cert.org | http://www.vupen.com/english/advisories/2010/0366 | ||
| cret@cert.org | http://www.vupen.com/english/advisories/2010/0635 | ||
| cret@cert.org | http://www.w3.org/2008/06/xmldsigcore-errata.html#e03 | Vendor Advisory | |
| cret@cert.org | http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html | Vendor Advisory | |
| cret@cert.org | https://bugzilla.redhat.com/show_bug.cgi?id=511915 | ||
| cret@cert.org | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041 | ||
| cret@cert.org | https://issues.apache.org/bugzilla/show_bug.cgi?id=47526 | ||
| cret@cert.org | https://issues.apache.org/bugzilla/show_bug.cgi?id=47527 | ||
| cret@cert.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186 | ||
| cret@cert.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158 | ||
| cret@cert.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717 | ||
| cret@cert.org | https://rhn.redhat.com/errata/RHSA-2009-1200.html | ||
| cret@cert.org | https://rhn.redhat.com/errata/RHSA-2009-1201.html | ||
| cret@cert.org | https://rhn.redhat.com/errata/RHSA-2009-1428.html | ||
| cret@cert.org | https://rhn.redhat.com/errata/RHSA-2009-1636.html | ||
| cret@cert.org | https://rhn.redhat.com/errata/RHSA-2009-1637.html | ||
| cret@cert.org | https://rhn.redhat.com/errata/RHSA-2009-1649.html | ||
| cret@cert.org | https://rhn.redhat.com/errata/RHSA-2009-1650.html | ||
| cret@cert.org | https://usn.ubuntu.com/826-1/ | ||
| cret@cert.org | https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html | ||
| cret@cert.org | https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html | ||
| cret@cert.org | https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html | ||
| cret@cert.org | https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=125787273209737&w=2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/55895 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/55907 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34461 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35776 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35852 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35853 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35854 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35855 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35858 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36162 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36176 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36180 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36494 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37300 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37671 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37841 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38567 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38568 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38695 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/38921 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/41818 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60799 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?revision=794013&view=revision | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023545&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?rs=180&context=SSEQTP&dc=D400&uid=swg24023723&loc=en_US&cs=UTF-8&lang=en&rss=ct180websphere | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg21384925 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.aleksey.com/xmlsec/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2010/dsa-1995 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/466161 | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/WDON-7TY529 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:209 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mono-project.com/Vulnerabilities | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openoffice.org/security/cves/CVE-2009-0217.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1694.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/35671 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022561 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022567 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022661 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-903-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA09-294A.html | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA10-159B.html | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1900 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1908 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1909 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1911 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/2543 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3122 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0366 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2010/0635 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.w3.org/2008/06/xmldsigcore-errata.html#e03 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=511915 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/bugzilla/show_bug.cgi?id=47526 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://issues.apache.org/bugzilla/show_bug.cgi?id=47527 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1200.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1201.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1428.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1636.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1637.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1649.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1650.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/826-1/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html |
| Vendor | Product | Version | |
|---|---|---|---|
| ibm | websphere_application_server | 6.0 | |
| ibm | websphere_application_server | 6.0.0.1 | |
| ibm | websphere_application_server | 6.0.0.2 | |
| ibm | websphere_application_server | 6.0.0.3 | |
| ibm | websphere_application_server | 6.0.1 | |
| ibm | websphere_application_server | 6.0.1.1 | |
| ibm | websphere_application_server | 6.0.1.2 | |
| ibm | websphere_application_server | 6.0.1.3 | |
| ibm | websphere_application_server | 6.0.1.5 | |
| ibm | websphere_application_server | 6.0.1.7 | |
| ibm | websphere_application_server | 6.0.1.9 | |
| ibm | websphere_application_server | 6.0.1.11 | |
| ibm | websphere_application_server | 6.0.1.13 | |
| ibm | websphere_application_server | 6.0.1.15 | |
| ibm | websphere_application_server | 6.0.1.17 | |
| ibm | websphere_application_server | 6.0.2 | |
| ibm | websphere_application_server | 6.0.2 | |
| ibm | websphere_application_server | 6.0.2.1 | |
| ibm | websphere_application_server | 6.0.2.2 | |
| ibm | websphere_application_server | 6.0.2.3 | |
| ibm | websphere_application_server | 6.0.2.10 | |
| ibm | websphere_application_server | 6.0.2.11 | |
| ibm | websphere_application_server | 6.0.2.12 | |
| ibm | websphere_application_server | 6.0.2.13 | |
| ibm | websphere_application_server | 6.0.2.14 | |
| ibm | websphere_application_server | 6.0.2.15 | |
| ibm | websphere_application_server | 6.0.2.16 | |
| ibm | websphere_application_server | 6.0.2.17 | |
| ibm | websphere_application_server | 6.0.2.18 | |
| ibm | websphere_application_server | 6.0.2.19 | |
| ibm | websphere_application_server | 6.0.2.20 | |
| ibm | websphere_application_server | 6.0.2.21 | |
| ibm | websphere_application_server | 6.0.2.22 | |
| ibm | websphere_application_server | 6.0.2.23 | |
| ibm | websphere_application_server | 6.0.2.24 | |
| ibm | websphere_application_server | 6.0.2.25 | |
| ibm | websphere_application_server | 6.0.2.28 | |
| ibm | websphere_application_server | 6.0.2.29 | |
| ibm | websphere_application_server | 6.0.2.30 | |
| ibm | websphere_application_server | 6.0.2.31 | |
| ibm | websphere_application_server | 6.0.2.32 | |
| ibm | websphere_application_server | 6.0.2.33 | |
| ibm | websphere_application_server | 6.1 | |
| ibm | websphere_application_server | 6.1.0 | |
| ibm | websphere_application_server | 6.1.0.0 | |
| ibm | websphere_application_server | 6.1.0.1 | |
| ibm | websphere_application_server | 6.1.0.2 | |
| ibm | websphere_application_server | 6.1.0.3 | |
| ibm | websphere_application_server | 6.1.0.4 | |
| ibm | websphere_application_server | 6.1.0.5 | |
| ibm | websphere_application_server | 6.1.0.6 | |
| ibm | websphere_application_server | 6.1.0.7 | |
| ibm | websphere_application_server | 6.1.0.8 | |
| ibm | websphere_application_server | 6.1.0.9 | |
| ibm | websphere_application_server | 6.1.0.10 | |
| ibm | websphere_application_server | 6.1.0.11 | |
| ibm | websphere_application_server | 6.1.0.12 | |
| ibm | websphere_application_server | 6.1.0.13 | |
| ibm | websphere_application_server | 6.1.0.14 | |
| ibm | websphere_application_server | 6.1.0.15 | |
| ibm | websphere_application_server | 6.1.0.16 | |
| ibm | websphere_application_server | 6.1.0.17 | |
| ibm | websphere_application_server | 6.1.0.18 | |
| ibm | websphere_application_server | 6.1.0.19 | |
| ibm | websphere_application_server | 6.1.0.20 | |
| ibm | websphere_application_server | 6.1.0.21 | |
| ibm | websphere_application_server | 6.1.0.22 | |
| ibm | websphere_application_server | 6.1.0.23 | |
| ibm | websphere_application_server | 7.0 | |
| ibm | websphere_application_server | 7.0.0.1 | |
| mono_project | mono | 1.2.1 | |
| mono_project | mono | 1.2.2 | |
| mono_project | mono | 1.2.3 | |
| mono_project | mono | 1.2.4 | |
| mono_project | mono | 1.2.5 | |
| mono_project | mono | 1.2.6 | |
| mono_project | mono | 1.9 | |
| mono_project | mono | 2.0 | |
| oracle | application_server | 10.1.2.3 | |
| oracle | application_server | 10.1.3.4 | |
| oracle | application_server | 10.1.4.3im | |
| oracle | bea_product_suite | 8.1 | |
| oracle | bea_product_suite | 9.0 | |
| oracle | bea_product_suite | 9.1 | |
| oracle | bea_product_suite | 9.2 | |
| oracle | bea_product_suite | 10.0 | |
| oracle | bea_product_suite | 10.3 | |
| oracle | weblogic_server_component | 8.1 | |
| oracle | weblogic_server_component | 9.0 | |
| oracle | weblogic_server_component | 9.1 | |
| oracle | weblogic_server_component | 9.2 | |
| oracle | weblogic_server_component | 10.0 | |
| oracle | weblogic_server_component | 10.3 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "01F45BA3-6504-47AF-B757-7B6D3526FBF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E3E6D6AF-0D69-4605-B871-6DAE01CF08EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F5EE7744-4584-4AE4-9F27-11EFAA002E77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0DE0C501-4062-49D0-8983-5E92765C7181",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE27E903-6D65-4D29-9583-43FB4CB473B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4A754DD5-585B-4E89-9C01-2B47D2F5F6F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D40DEF90-CE7F-46BB-A6FF-50C1797866B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A5AAA544-D3F8-4AE2-BB2D-A64CB86EC988",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7C7D4ECD-8787-4F9B-B81C-C0DFD8DD20EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C43D3515-D9F5-4DC8-A030-9F97593495F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A1968803-FF03-477C-81FE-87528FC6DF6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "62C1CA3B-E575-4531-A336-8BFC9F5DEC26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6C130982-8C6E-413E-8296-C9C277FCBE6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5E1790E4-073A-4666-80CB-4D967928A0BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "6239EEAE-5852-4DF7-8627-87139BBB03B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "714C405D-1E8F-45C1-8A09-5103F0080C76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:fp17:*:*:*:*:*",
"matchCriteriaId": "D592217D-3489-40AE-8338-BF5AA5BBA251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C7F31FD3-8681-4F07-9644-5CC87D512520",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C2604E01-E43E-4882-8896-5E646E850286",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "458BAD79-958E-4665-B1F8-0D46E0C57045",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A98E5593-1534-48E2-8CD5-B2D1CACDDAB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "DB4AB6BD-4439-4100-A3CE-4600AED10B65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "FD71D5EA-9AF5-422C-810A-D136A5F132F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "375DF4AF-3C7C-47C3-BBB8-AF2B3827AC13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "2C9D6BDA-39E1-4D15-9D86-E212809998FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "91CC2DA7-BAA6-4061-8D0C-81F002DEF06D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2A78FE-8FA6-4532-9E9E-CF6F860EFAE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "59BEDD70-B6DB-448F-A998-3E8774B0DB8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "63099EF9-0512-44CD-946A-9B25144E50D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "F200042C-D45E-4CAD-BF6E-E3DADF4D1D21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "D9132BB1-5E2E-4CA6-9B63-027CF2A7229D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "D839EDB9-A44F-4F7F-94EF-1A77371D705C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "4421929D-C4B9-43C5-BE61-E68484D3B198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "EB622117-C91F-47D2-9832-B7DB340796E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "0D65E0CC-FA8C-41FD-B256-47DB0C9757FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "6D87691D-0719-4447-B258-5FA2BD10F11A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "4D0B1A00-191D-49B2-8841-FB6C48A5D0C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "BF771E28-65AC-4A94-8A51-4EA77BC3D0B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "E5594891-E790-44E7-BC9E-0A413B385E1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.31:*:*:*:*:*:*:*",
"matchCriteriaId": "C286007A-361F-47BB-A099-E041D5CF6E48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.32:*:*:*:*:*:*:*",
"matchCriteriaId": "CD464F13-942D-40EC-8144-6D23A0AEAA81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.33:*:*:*:*:*:*:*",
"matchCriteriaId": "05BC8C52-DA95-4BF2-AD47-9922741CAAF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B9CDD56-921C-4FAF-87E2-14B91EC1A93D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "95255265-6D69-46D3-9FFA-8EDB1734375C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2E4191D3-64AB-482C-9DEF-DD04C4C942CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5FC6EB31-9707-408B-8BF5-66BD23441A75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9B73E052-AF4F-4543-AA03-F5B1FA976EA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "23171B81-C991-467A-95A4-EDDAC59C37BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "CBD75308-7F21-4DDF-AD66-C155CF4B721B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2586C584-3258-414B-AB28-1EBA0DBD0B83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "431C250D-8279-4071-871C-1C7C4DE09B5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "BCA175EA-EDC6-4228-8E28-E9BBC981E60A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "FC300B03-7A8F-4E96-B55D-18CC258BBFCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C6A4EC9D-98C2-40B0-BA40-4838FE8D1FF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "D3A3ADFB-93E0-42E5-B31B-59F22EA4E3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF5BB33-4E78-4123-8093-EBEE2F2B5598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E3F4B8EA-9299-42C1-AAFB-831701ED2FA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A45B6F32-5DFF-4833-9F0F-89576724CF97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "13C8054A-8581-4936-AF94-291AE56EB4DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "13CA9A59-DFE4-4566-8719-E6FA4720F06A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "026EBFCD-0BC1-404B-BC14-292F35BE667A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A89DD1BF-4AB0-480D-9856-B1BEA73A4AAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "B13D74F8-4321-48B3-A33E-FCCFA93013CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "49E119EF-B6A5-4B6C-B199-C64F62CA7CB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "2043B836-3950-46A1-89E4-08985DEA0D33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "C9C8FA3D-9162-4D9B-8250-FAC93ED77A2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE93B7F-3EB5-4BE4-BFAA-4AA30D15A76D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "E06DE5D4-D3A5-4783-ACE0-A80808DB09C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0905C80-A1BA-49CD-90CA-9270ECC3940C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B108457A-50DC-4432-9E30-98ADBEBF2389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mono_project:mono:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "403E554C-FD1B-42CE-82C2-43CC191905DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mono_project:mono:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "78278FE6-26EA-4E89-9423-EABA6C4D8877",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mono_project:mono:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "15E1695E-FD6E-4602-9BD9-9CFFF20574CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mono_project:mono:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "691B3AF1-7F3F-4A7D-9F16-FE6044E33482",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mono_project:mono:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E2DE3739-A2ED-47D7-9AE9-442A95ACFC3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mono_project:mono:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DDAB5331-AD2E-483C-93C3-8095BBBA0572",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mono_project:mono:1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E3CC03DC-14A6-4C45-9511-7CE8E7F727BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mono_project:mono:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C71A1398-8AA5-4AB3-89C8-E2E2B36FA5AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "96C617ED-3D8C-4B64-A56A-30BDE6E9B8D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D41A0A9E-6B5B-4FA9-996B-E589B96C24D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:application_server:10.1.4.3im:*:*:*:*:*:*:*",
"matchCriteriaId": "25672ED0-9830-48B3-899A-405B97E2229A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*",
"matchCriteriaId": "0B8AB045-051A-477E-B2F7-4057826C43F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6B5D9ABA-10EE-4EE2-9814-BDFBBE9A6014",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "09215858-8A4F-4595-98DD-39027EC6CC1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:*",
"matchCriteriaId": "A7390B6A-7944-4509-B499-5B51DB9BF42E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*",
"matchCriteriaId": "193516AD-8096-4A6E-9C4B-4B9717DD7021",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2B1C64BD-7C8C-4B28-9EA8-5198B6C71AD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server_component:8.1:sp6:*:*:*:*:*:*",
"matchCriteriaId": "B3B986B9-A82B-4087-808E-854EC443AC3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server_component:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6AF95249-8970-406B-B874-4B9925471C27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server_component:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DD536DD6-AF76-4075-8B28-322FB65793AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server_component:9.2:mp3:*:*:*:*:*:*",
"matchCriteriaId": "9BDA1940-A3F4-4CEC-BDD0-B098B2E27CE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server_component:10.0:mp1:*:*:*:*:*:*",
"matchCriteriaId": "3BB8A45D-95E5-4F14-A51A-29B5A6E45F43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server_component:10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3D253B-73D7-4916-B5E4-9D553741E98C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits."
},
{
"lang": "es",
"value": "El dise\u00f1o de la recomendaci\u00f3n de W3C XML Signature Syntax and Processing (XMLDsig), tal y como es implementado en productos que incluyen (1) el componente Oracle Security Developer Tools de Application Server de Oracle en versiones 10.1.2.3, 10.1.3.4 y 10.1.4.3IM; (2) el componente WebLogic Server de Product Suite de BEA en las versiones 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0 y 8.1 SP6; (3) Mono anterior a versi\u00f3n 2.4.2.2; (4) XML Security Library anterior a versi\u00f3n 1.2.12; (5) WebSphere Application Server de IBM versiones 6.0 hasta 6.0.2.33, versiones 6.1 hasta 6.1.0.23 y versiones 7.0 hasta 7.0.0.1; (6) JDK y JRE de Sun Update 14 y versiones anteriores; (7) .NET Framework de Microsoft versiones 3.0 hasta 3.0 SP2, versiones 3.5 y 4.0; y otros productos utilizan un par\u00e1metro que define una longitud de truncamiento HMAC (HMACOutputLength) pero no requiere un m\u00ednimo para esta longitud, lo que permite a los atacantes suplantar firmas basadas en HMAC y omitir la autenticaci\u00f3n mediante la especificaci\u00f3n de una longitud de truncamiento con un peque\u00f1o n\u00famero de bits."
}
],
"id": "CVE-2009-0217",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-07-14T23:30:00.187",
"references": [
{
"source": "cret@cert.org",
"url": "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161"
},
{
"source": "cret@cert.org",
"url": "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"source": "cret@cert.org",
"url": "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"source": "cret@cert.org",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"source": "cret@cert.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"source": "cret@cert.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html"
},
{
"source": "cret@cert.org",
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"source": "cret@cert.org",
"url": "http://osvdb.org/55895"
},
{
"source": "cret@cert.org",
"url": "http://osvdb.org/55907"
},
{
"source": "cret@cert.org",
"url": "http://secunia.com/advisories/34461"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35776"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35852"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35853"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35854"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35855"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35858"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36162"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36176"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36180"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36494"
},
{
"source": "cret@cert.org",
"url": "http://secunia.com/advisories/37300"
},
{
"source": "cret@cert.org",
"url": "http://secunia.com/advisories/37671"
},
{
"source": "cret@cert.org",
"url": "http://secunia.com/advisories/37841"
},
{
"source": "cret@cert.org",
"url": "http://secunia.com/advisories/38567"
},
{
"source": "cret@cert.org",
"url": "http://secunia.com/advisories/38568"
},
{
"source": "cret@cert.org",
"url": "http://secunia.com/advisories/38695"
},
{
"source": "cret@cert.org",
"url": "http://secunia.com/advisories/38921"
},
{
"source": "cret@cert.org",
"url": "http://secunia.com/advisories/41818"
},
{
"source": "cret@cert.org",
"url": "http://secunia.com/advisories/60799"
},
{
"source": "cret@cert.org",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"source": "cret@cert.org",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1"
},
{
"source": "cret@cert.org",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1"
},
{
"source": "cret@cert.org",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1"
},
{
"source": "cret@cert.org",
"url": "http://svn.apache.org/viewvc?revision=794013\u0026view=revision"
},
{
"source": "cret@cert.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023545\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"source": "cret@cert.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023723\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"source": "cret@cert.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925"
},
{
"source": "cret@cert.org",
"url": "http://www.aleksey.com/xmlsec/"
},
{
"source": "cret@cert.org",
"url": "http://www.debian.org/security/2010/dsa-1995"
},
{
"source": "cret@cert.org",
"url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
},
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/466161"
},
{
"source": "cret@cert.org",
"url": "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ"
},
{
"source": "cret@cert.org",
"url": "http://www.kb.cert.org/vuls/id/WDON-7TY529"
},
{
"source": "cret@cert.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mono-project.com/Vulnerabilities"
},
{
"source": "cret@cert.org",
"url": "http://www.openoffice.org/security/cves/CVE-2009-0217.html"
},
{
"source": "cret@cert.org",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
},
{
"source": "cret@cert.org",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"source": "cret@cert.org",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
},
{
"source": "cret@cert.org",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html"
},
{
"source": "cret@cert.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/35671"
},
{
"source": "cret@cert.org",
"url": "http://www.securitytracker.com/id?1022561"
},
{
"source": "cret@cert.org",
"url": "http://www.securitytracker.com/id?1022567"
},
{
"source": "cret@cert.org",
"url": "http://www.securitytracker.com/id?1022661"
},
{
"source": "cret@cert.org",
"url": "http://www.ubuntu.com/usn/USN-903-1"
},
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"source": "cret@cert.org",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA10-159B.html"
},
{
"source": "cret@cert.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1900"
},
{
"source": "cret@cert.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1908"
},
{
"source": "cret@cert.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1909"
},
{
"source": "cret@cert.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1911"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2009/3122"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2010/0366"
},
{
"source": "cret@cert.org",
"url": "http://www.vupen.com/english/advisories/2010/0635"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03"
},
{
"source": "cret@cert.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html"
},
{
"source": "cret@cert.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"source": "cret@cert.org",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041"
},
{
"source": "cret@cert.org",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526"
},
{
"source": "cret@cert.org",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527"
},
{
"source": "cret@cert.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186"
},
{
"source": "cret@cert.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158"
},
{
"source": "cret@cert.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717"
},
{
"source": "cret@cert.org",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"source": "cret@cert.org",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"source": "cret@cert.org",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1428.html"
},
{
"source": "cret@cert.org",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1636.html"
},
{
"source": "cret@cert.org",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1637.html"
},
{
"source": "cret@cert.org",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1649.html"
},
{
"source": "cret@cert.org",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1650.html"
},
{
"source": "cret@cert.org",
"url": "https://usn.ubuntu.com/826-1/"
},
{
"source": "cret@cert.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"
},
{
"source": "cret@cert.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"
},
{
"source": "cret@cert.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html"
},
{
"source": "cret@cert.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/55895"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/55907"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/34461"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35776"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35852"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35853"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35854"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35855"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35858"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36162"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36180"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36494"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37300"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37671"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37841"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/38567"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/38568"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/38695"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/38921"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/41818"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/60799"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://svn.apache.org/viewvc?revision=794013\u0026view=revision"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023545\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023723\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.aleksey.com/xmlsec/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2010/dsa-1995"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/466161"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.kb.cert.org/vuls/id/WDON-7TY529"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mono-project.com/Vulnerabilities"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openoffice.org/security/cves/CVE-2009-0217.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/35671"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1022561"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1022567"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1022661"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-903-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA10-159B.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1900"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1908"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1909"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1911"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/3122"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/0366"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2010/0635"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1428.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1636.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1637.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1649.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1650.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/826-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html"
}
],
"sourceIdentifier": "cret@cert.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2009-0217
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2009-0217",
"description": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"id": "GSD-2009-0217",
"references": [
"https://www.suse.com/security/cve/CVE-2009-0217.html",
"https://www.debian.org/security/2010/dsa-1995",
"https://www.debian.org/security/2009/dsa-1849",
"https://access.redhat.com/errata/RHSA-2010:0043",
"https://access.redhat.com/errata/RHSA-2009:1694",
"https://access.redhat.com/errata/RHSA-2009:1650",
"https://access.redhat.com/errata/RHSA-2009:1649",
"https://access.redhat.com/errata/RHSA-2009:1637",
"https://access.redhat.com/errata/RHSA-2009:1636",
"https://access.redhat.com/errata/RHSA-2009:1428",
"https://access.redhat.com/errata/RHSA-2009:1201",
"https://access.redhat.com/errata/RHSA-2009:1200",
"https://linux.oracle.com/cve/CVE-2009-0217.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-0217"
],
"details": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"id": "GSD-2009-0217",
"modified": "2023-12-13T01:19:44.491810Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2009-0217",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2009:1428",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1428.html"
},
{
"name": "ADV-2009-3122",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3122"
},
{
"name": "http://www.openoffice.org/security/cves/CVE-2009-0217.html",
"refsource": "CONFIRM",
"url": "http://www.openoffice.org/security/cves/CVE-2009-0217.html"
},
{
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526"
},
{
"name": "60799",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60799"
},
{
"name": "GLSA-201408-19",
"refsource": "GENTOO",
"url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
},
{
"name": "PK80596",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023545\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"name": "RHSA-2009:1200",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"name": "35776",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35776"
},
{
"name": "36162",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36162"
},
{
"name": "36494",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36494"
},
{
"name": "ADV-2009-2543",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"name": "35858",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35858"
},
{
"name": "38695",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38695"
},
{
"name": "269208",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1"
},
{
"name": "DSA-1995",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-1995"
},
{
"name": "HPSBUX02476",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "35853",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35853"
},
{
"name": "RHSA-2009:1637",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1637.html"
},
{
"name": "RHSA-2009:1694",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html"
},
{
"name": "35852",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35852"
},
{
"name": "35854",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35854"
},
{
"name": "34461",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/34461"
},
{
"name": "http://www.kb.cert.org/vuls/id/WDON-7TY529",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/WDON-7TY529"
},
{
"name": "http://www.mono-project.com/Vulnerabilities",
"refsource": "CONFIRM",
"url": "http://www.mono-project.com/Vulnerabilities"
},
{
"name": "1020710",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1"
},
{
"name": "USN-903-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-903-1"
},
{
"name": "35671",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35671"
},
{
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527",
"refsource": "CONFIRM",
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527"
},
{
"name": "ADV-2010-0366",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0366"
},
{
"name": "55907",
"refsource": "OSVDB",
"url": "http://osvdb.org/55907"
},
{
"name": "MDVSA-2009:209",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"
},
{
"name": "SUSE-SA:2010:017",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html"
},
{
"name": "38567",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38567"
},
{
"name": "FEDORA-2009-8329",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"
},
{
"name": "263429",
"refsource": "SUNALERT",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1"
},
{
"name": "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161",
"refsource": "CONFIRM",
"url": "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161"
},
{
"name": "SSRT090250",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "ADV-2009-1900",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1900"
},
{
"name": "1022561",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022561"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
},
{
"name": "37671",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37671"
},
{
"name": "VU#466161",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/466161"
},
{
"name": "1022567",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022567"
},
{
"name": "RHSA-2009:1636",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1636.html"
},
{
"name": "PK80627",
"refsource": "AIXAPAR",
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023723\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"name": "RHSA-2009:1649",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1649.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
},
{
"name": "TA09-294A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name": "ADV-2009-1909",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1909"
},
{
"name": "ADV-2010-0635",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0635"
},
{
"name": "http://svn.apache.org/viewvc?revision=794013\u0026view=revision",
"refsource": "CONFIRM",
"url": "http://svn.apache.org/viewvc?revision=794013\u0026view=revision"
},
{
"name": "38568",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38568"
},
{
"name": "36180",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36180"
},
{
"name": "FEDORA-2009-8456",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html"
},
{
"name": "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03",
"refsource": "CONFIRM",
"url": "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03"
},
{
"name": "USN-826-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/826-1/"
},
{
"name": "37841",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37841"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
"refsource": "CONFIRM",
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"name": "35855",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35855"
},
{
"name": "FEDORA-2009-8473",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html"
},
{
"name": "36176",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36176"
},
{
"name": "oval:org.mitre.oval:def:7158",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158"
},
{
"name": "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html",
"refsource": "MISC",
"url": "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html"
},
{
"name": "ADV-2009-1908",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1908"
},
{
"name": "FEDORA-2009-8337",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"
},
{
"name": "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925"
},
{
"name": "41818",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41818"
},
{
"name": "1022661",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022661"
},
{
"name": "37300",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37300"
},
{
"name": "ADV-2009-1911",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1911"
},
{
"name": "APPLE-SA-2009-09-03-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"name": "SUSE-SA:2009:053",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"name": "oval:org.mitre.oval:def:8717",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717"
},
{
"name": "RHSA-2009:1201",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"name": "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7",
"refsource": "CONFIRM",
"url": "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"name": "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ",
"refsource": "CONFIRM",
"url": "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ"
},
{
"name": "TA10-159B",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA10-159B.html"
},
{
"name": "oval:org.mitre.oval:def:10186",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186"
},
{
"name": "55895",
"refsource": "OSVDB",
"url": "http://osvdb.org/55895"
},
{
"name": "http://www.aleksey.com/xmlsec/",
"refsource": "CONFIRM",
"url": "http://www.aleksey.com/xmlsec/"
},
{
"name": "MS10-041",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041"
},
{
"name": "38921",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38921"
},
{
"name": "RHSA-2009:1650",
"refsource": "REDHAT",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1650.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=511915",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "[1.4-alpha0,1.4.2]",
"affected_versions": "All versions starting from 1.4-alpha0 up to 1.4.2",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-937"
],
"date": "2018-10-12",
"description": "This package uses a parameter that defines an HMAC truncation length (`HMACOutputLength`) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.",
"fixed_versions": [
"1.4.3"
],
"identifier": "CVE-2009-0217",
"identifiers": [
"CVE-2009-0217"
],
"not_impacted": "All versions before 1.4-alpha0, all versions after 1.4.2",
"package_slug": "maven/org.apache.santuario/xmlsec",
"pubdate": "2009-07-14",
"solution": "Upgrade to version 1.4.3 or above.",
"title": "XML signature HMAC truncation authentication bypass",
"urls": [
"http://svn.apache.org/viewvc?view=revision\u0026revision=794013",
"https://bugzilla.redhat.com/CVE-2009-0217"
],
"uuid": "14840313-e424-49fa-a16a-7510c93c9397"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:bea_product_suite:10.0:mp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mono_project:mono:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:weblogic_server_component:10.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:weblogic_server_component:10.0:mp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:bea_product_suite:9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:bea_product_suite:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mono_project:mono:1.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mono_project:mono:1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:application_server:10.1.4.3im:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:bea_product_suite:10.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mono_project:mono:1.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mono_project:mono:1.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:weblogic_server_component:9.2:mp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:weblogic_server_component:9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:bea_product_suite:9.2:mp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:bea_product_suite:8.1:sp6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mono_project:mono:1.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mono_project:mono:1.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mono_project:mono:1.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:weblogic_server_component:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:weblogic_server_component:8.1:sp6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:fp17:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2009-0217"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#466161",
"refsource": "CERT-VN",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/466161"
},
{
"name": "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.w3.org/2008/06/xmldsigcore-errata.html#e03"
},
{
"name": "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "http://www.w3.org/QA/2009/07/hmac_truncation_in_xml_signatu.html"
},
{
"name": "http://www.aleksey.com/xmlsec/",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.aleksey.com/xmlsec/"
},
{
"name": "http://www.mono-project.com/Vulnerabilities",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.mono-project.com/Vulnerabilities"
},
{
"name": "ADV-2009-1911",
"refsource": "VUPEN",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1911"
},
{
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47527"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg21384925"
},
{
"name": "1022561",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1022561"
},
{
"name": "PK80596",
"refsource": "AIXAPAR",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023545\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"name": "PK80627",
"refsource": "AIXAPAR",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026context=SSEQTP\u0026dc=D400\u0026uid=swg24023723\u0026loc=en_US\u0026cs=UTF-8\u0026lang=en\u0026rss=ct180websphere"
},
{
"name": "ADV-2009-1908",
"refsource": "VUPEN",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1908"
},
{
"name": "55895",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/55895"
},
{
"name": "35776",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35776"
},
{
"name": "ADV-2009-1900",
"refsource": "VUPEN",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1900"
},
{
"name": "55907",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/55907"
},
{
"name": "1022567",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1022567"
},
{
"name": "35855",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35855"
},
{
"name": "35853",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35853"
},
{
"name": "35854",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35854"
},
{
"name": "35858",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35858"
},
{
"name": "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.kb.cert.org/vuls/id/MAPG-7TSKXQ"
},
{
"name": "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161",
"refsource": "CONFIRM",
"tags": [],
"url": "http://blogs.sun.com/security/entry/cert_vulnerability_note_vu_466161"
},
{
"name": "http://www.kb.cert.org/vuls/id/WDON-7TY529",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.kb.cert.org/vuls/id/WDON-7TY529"
},
{
"name": "263429",
"refsource": "SUNALERT",
"tags": [],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263429-1"
},
{
"name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1",
"refsource": "CONFIRM",
"tags": [],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"
},
{
"name": "35671",
"refsource": "BID",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/35671"
},
{
"name": "RHSA-2009:1201",
"refsource": "REDHAT",
"tags": [],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html"
},
{
"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=47526"
},
{
"name": "36180",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36180"
},
{
"name": "RHSA-2009:1200",
"refsource": "REDHAT",
"tags": [],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html"
},
{
"name": "ADV-2009-1909",
"refsource": "VUPEN",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1909"
},
{
"name": "1022661",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1022661"
},
{
"name": "36162",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36162"
},
{
"name": "35852",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35852"
},
{
"name": "36176",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36176"
},
{
"name": "FEDORA-2009-8329",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"
},
{
"name": "FEDORA-2009-8337",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"
},
{
"name": "FEDORA-2009-8456",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00494.html"
},
{
"name": "FEDORA-2009-8473",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00505.html"
},
{
"name": "MDVSA-2009:209",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"
},
{
"name": "36494",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/36494"
},
{
"name": "APPLE-SA-2009-09-03-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"
},
{
"name": "ADV-2009-2543",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/2543"
},
{
"name": "TA09-294A",
"refsource": "CERT",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html"
},
{
"name": "ADV-2009-3122",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/3122"
},
{
"name": "SUSE-SA:2009:053",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"
},
{
"name": "269208",
"refsource": "SUNALERT",
"tags": [],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-269208-1"
},
{
"name": "HPSBUX02476",
"refsource": "HP",
"tags": [],
"url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2"
},
{
"name": "37300",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37300"
},
{
"name": "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7",
"refsource": "CONFIRM",
"tags": [],
"url": "http://git.gnome.org/cgit/xmlsec/commit/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"name": "RHSA-2009:1428",
"refsource": "REDHAT",
"tags": [],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1428.html"
},
{
"name": "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7",
"refsource": "CONFIRM",
"tags": [],
"url": "http://git.gnome.org/cgit/xmlsec/patch/?id=34b349675af9f72eb822837a8772cc1ead7115c7"
},
{
"name": "http://svn.apache.org/viewvc?revision=794013\u0026view=revision",
"refsource": "CONFIRM",
"tags": [],
"url": "http://svn.apache.org/viewvc?revision=794013\u0026view=revision"
},
{
"name": "RHSA-2009:1649",
"refsource": "REDHAT",
"tags": [],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1649.html"
},
{
"name": "RHSA-2009:1637",
"refsource": "REDHAT",
"tags": [],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1637.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=511915",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915"
},
{
"name": "RHSA-2009:1636",
"refsource": "REDHAT",
"tags": [],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1636.html"
},
{
"name": "37671",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37671"
},
{
"name": "RHSA-2009:1650",
"refsource": "REDHAT",
"tags": [],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1650.html"
},
{
"name": "37841",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37841"
},
{
"name": "RHSA-2009:1694",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1694.html"
},
{
"name": "38567",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/38567"
},
{
"name": "38568",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/38568"
},
{
"name": "ADV-2010-0366",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2010/0366"
},
{
"name": "DSA-1995",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2010/dsa-1995"
},
{
"name": "http://www.openoffice.org/security/cves/CVE-2009-0217.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.openoffice.org/security/cves/CVE-2009-0217.html"
},
{
"name": "38695",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/38695"
},
{
"name": "USN-903-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-903-1"
},
{
"name": "SUSE-SA:2010:017",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00005.html"
},
{
"name": "38921",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/38921"
},
{
"name": "ADV-2010-0635",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2010/0635"
},
{
"name": "1020710",
"refsource": "SUNALERT",
"tags": [],
"url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020710.1-1"
},
{
"name": "TA10-159B",
"refsource": "CERT",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA10-159B.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"
},
{
"name": "34461",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/34461"
},
{
"name": "GLSA-201408-19",
"refsource": "GENTOO",
"tags": [],
"url": "http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml"
},
{
"name": "60799",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/60799"
},
{
"name": "41818",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/41818"
},
{
"name": "oval:org.mitre.oval:def:8717",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8717"
},
{
"name": "oval:org.mitre.oval:def:7158",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7158"
},
{
"name": "oval:org.mitre.oval:def:10186",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10186"
},
{
"name": "USN-826-1",
"refsource": "UBUNTU",
"tags": [],
"url": "https://usn.ubuntu.com/826-1/"
},
{
"name": "MS10-041",
"refsource": "MS",
"tags": [],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-041"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-12T21:49Z",
"publishedDate": "2009-07-14T23:30Z"
}
}
}
WID-SEC-W-2022-1738
Vulnerability from csaf_certbund - Published: 2022-10-16 22:00 - Updated: 2023-09-27 22:00In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-1738 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1738.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-1738 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1738"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7038982 vom 2023-09-28",
"url": "https://www.ibm.com/support/pages/node/7038982"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6829353 vom 2022-10-16",
"url": "https://www.ibm.com/support/pages/node/6829353"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6829371 vom 2022-10-16",
"url": "https://www.ibm.com/support/pages/node/6829371"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6829373 vom 2022-10-16",
"url": "https://www.ibm.com/support/pages/node/6829373"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6829335 vom 2022-10-16",
"url": "https://www.ibm.com/support/pages/node/6829335"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6829311 vom 2022-10-16",
"url": "https://www.ibm.com/support/pages/node/6829311"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6829369 vom 2022-10-16",
"url": "https://www.ibm.com/support/pages/node/6829369"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6829325 vom 2022-10-16",
"url": "https://www.ibm.com/support/pages/node/6829325"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6829365 vom 2022-10-16",
"url": "https://www.ibm.com/support/pages/node/6829365"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6829361 vom 2022-10-16",
"url": "https://www.ibm.com/support/pages/node/6829361"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6829339 vom 2022-10-16",
"url": "https://www.ibm.com/support/pages/node/6829339"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6829349 vom 2022-10-16",
"url": "https://www.ibm.com/support/pages/node/6829349"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6829363 vom 2022-10-16",
"url": "https://www.ibm.com/support/pages/node/6829363"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6829327 vom 2022-10-16",
"url": "https://www.ibm.com/support/pages/node/6829327"
},
{
"category": "external",
"summary": "IBM Security Bulletin 6955819 vom 2023-02-15",
"url": "https://www.ibm.com/support/pages/node/6955819"
}
],
"source_lang": "en-US",
"title": "IBM InfoSphere Information Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-09-27T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:36:32.285+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-1738",
"initial_release_date": "2022-10-16T22:00:00.000+00:00",
"revision_history": [
{
"date": "2022-10-16T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2022-11-03T23:00:00.000+00:00",
"number": "2",
"summary": "CVE erg\u00e4nzt"
},
{
"date": "2023-02-15T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2023-09-27T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IBM InfoSphere Information Server 11.7",
"product": {
"name": "IBM InfoSphere Information Server 11.7",
"product_id": "444803",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_information_server:11.7"
}
}
},
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0217",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2009-0217"
},
{
"cve": "CVE-2009-2625",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2009-2625"
},
{
"cve": "CVE-2012-0881",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2012-0881"
},
{
"cve": "CVE-2012-2098",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2012-2098"
},
{
"cve": "CVE-2013-2172",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2013-2172"
},
{
"cve": "CVE-2013-4002",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2013-4002"
},
{
"cve": "CVE-2013-4517",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2013-4517"
},
{
"cve": "CVE-2015-4852",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2015-4852"
},
{
"cve": "CVE-2015-6420",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2015-6420"
},
{
"cve": "CVE-2015-7501",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2015-7501"
},
{
"cve": "CVE-2017-15708",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2017-15708"
},
{
"cve": "CVE-2019-13116",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2019-13116"
},
{
"cve": "CVE-2021-33813",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2021-33813"
},
{
"cve": "CVE-2021-36373",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2021-36373"
},
{
"cve": "CVE-2021-36374",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2021-36374"
},
{
"cve": "CVE-2021-40690",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2021-40690"
},
{
"cve": "CVE-2021-41089",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2021-41089"
},
{
"cve": "CVE-2021-41091",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2021-41091"
},
{
"cve": "CVE-2022-22442",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2022-22442"
},
{
"cve": "CVE-2022-23437",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2022-23437"
},
{
"cve": "CVE-2022-24769",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2022-24769"
},
{
"cve": "CVE-2022-30608",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2022-30608"
},
{
"cve": "CVE-2022-30615",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2022-30615"
},
{
"cve": "CVE-2022-31129",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2022-31129"
},
{
"cve": "CVE-2022-35642",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2022-35642"
},
{
"cve": "CVE-2022-35717",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2022-35717"
},
{
"cve": "CVE-2022-36109",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2022-36109"
},
{
"cve": "CVE-2022-40235",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2022-40235"
},
{
"cve": "CVE-2022-40747",
"notes": [
{
"category": "description",
"text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"444803",
"T021415"
]
},
"release_date": "2022-10-16T22:00:00.000+00:00",
"title": "CVE-2022-40747"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.